PinnedVicky AryaninInfoSec Write-upsUse these cheatsheets to increase your CTF speed.This cheatsheet contains essential commands I always use in CTFs, THM boxes, and in cybersecurity. Includes commands and tools for…Nov 13, 20235Nov 13, 20235
PinnedVicky AryaninOSINT TeamOverTheWire —Ultimate Bandit WalkthroughToday, we will play a war-game called Bandit. It has a collection of 34 levels. OverTheWire Organization hosts this war-game. Absolute…Nov 23, 2023Nov 23, 2023
PinnedVicky AryanPython in a Nutshell! 🙃(Part-1)This article teaches you the basics of python in very less time. If you are a college student or a programmer or a hacker who want to…Aug 21, 2022Aug 21, 2022
PinnedVicky AryaninInfoSec Write-upsC Language for Hackers & Beyond! 0x01Hello Tenderfoot hackers, welcome you to the world of hacking. You came here because you don’t want to be a script kiddie in this…May 7, 20221May 7, 20221
Vicky AryaninInfoSec Write-upsTryHackMe : Text4shell WriteupHello Hackers! Dive Deep into the TXT4Shell TryHackMe Room: An Exclusive Walkthrough of My Custom CTF ChallengeSep 3Sep 3
Vicky AryaninInfoSec Write-upsBoost Your Bug Bounty Game: Get Started with Free VPS on Krutrim CloudIntroductionAug 172Aug 172
Vicky AryaninCoinmonksExploring Blockchain Technology: Decentralized Ledger Systems Revolutionizing Data ManagementHello everyone,Jun 22Jun 22
Vicky AryaninInfoSec Write-upsEscalation of Windows Privilege: Kernel Exploit.Table of ContentFeb 24Feb 24
Vicky AryanAn Extensive Look at Kerberoasting AttackIn this article, we will talk about kerberoasting attacks and other various forms of Kerberos authentication abuse . However, prior to…Dec 26, 20231Dec 26, 20231
Vicky AryaninSystem WeaknessWhat is this httpx thing? Using it in your adventure with Bugbounty?IntroductionDec 1, 2023Dec 1, 2023