PinnedVicky AryaninInfoSec Write-upsUse these cheatsheets to increase your CTF speed.This cheatsheet contains essential commands I always use in CTFs, THM boxes, and in cybersecurity. Includes commands and tools for…Nov 13, 20235Nov 13, 20235
PinnedVicky AryanOverTheWire —Ultimate Bandit WalkthroughToday, we will play a war-game called Bandit. It has a collection of 34 levels. OverTheWire Organization hosts this war-game. Absolute…Nov 23, 2023Nov 23, 2023
PinnedVicky AryanPython in a Nutshell! 🙃(Part-1)This article teaches you the basics of python in very less time. If you are a college student or a programmer or a hacker who want to…Aug 21, 2022Aug 21, 2022
PinnedVicky AryaninInfoSec Write-upsC Language for Hackers & Beyond! 0x01Hello Tenderfoot hackers, welcome you to the world of hacking. You came here because you don’t want to be a script kiddie in this…May 7, 20221May 7, 20221
Vicky AryaninCoinmonksExploring Blockchain Technology: Decentralized Ledger Systems Revolutionizing Data ManagementHello everyone,Jun 22Jun 22
Vicky AryaninInfoSec Write-upsEscalation of Windows Privilege: Kernel Exploit.Table of ContentFeb 24Feb 24
Vicky AryanAn Extensive Look at Kerberoasting AttackIn this article, we will talk about kerberoasting attacks and other various forms of Kerberos authentication abuse . However, prior to…Dec 26, 20231Dec 26, 20231
Vicky AryaninSystem WeaknessWhat is this httpx thing? Using it in your adventure with Bugbounty?IntroductionDec 1, 2023Dec 1, 2023
Vicky AryaninInfoSec Write-upsWhat are the log4j vulnerabilities, and how did it function?This post will explain and walk through the exploitation of the recently discovered vulnerability, CVE-2021–44228, that affects the Java…Nov 29, 2023Nov 29, 2023
Vicky AryaninInfoSec Write-upsWhat is Banner Grabbing??Several Approaches for Banner Grabs.In both the offensive and defensive penetration testing , grabbing a banner is the first and, it seems, the most crucial step. This post…Nov 24, 20231Nov 24, 20231