In an era where cyber-security threats are ever-evolving, ensuring the robustness of your systems…Whether you’re managing enterprise-level infrastructure or securing a personal server, regular system audits are critical to identify…Jan 7Jan 7
Malicious Word Files Used to Disseminate Konni RAT Malware CampaignSecurity researchers have uncovered a new campaign involving the notorious Konni RAT malware, which exploits malicious Word files as its…Nov 28, 2023Nov 28, 2023
3AM: Caffeine, Keyboards, and Questionable Life Choices“Here I am, at the ungodly hour of 3 AM on November 23, my eyes locked in a fierce battle with the glowing abyss of my computer screen. And…Nov 22, 2023Nov 22, 2023
What is Linux KernelThe Linux kernel is the core component of the Linux operating system (OS) and is responsible for managing the system’s resources and the…Nov 22, 2023Nov 22, 2023
What is DarkwebThe dark web, often portrayed as a mysterious and nefarious underbelly of the internet, is a topic that has fascinated and concerned many…Nov 22, 2023Nov 22, 2023
Ethical HackingStarting a journey in ethical hacking can be both exciting and daunting. Ethical hackers, also known as white hat hackers, play a crucial…Nov 22, 2023Nov 22, 2023
Getting Started With ReverseReverse engineering is a fascinating and invaluable skill in the world of technology and design. It involves deconstructing a product or…Nov 22, 2023Nov 22, 2023
Getting started with Capture The Flag (CTF) competitionsGetting started with Capture The Flag (CTF) competitions can be an exciting and rewarding journey for anyone interested in cybersecurity…Nov 22, 2023Nov 22, 2023
Getting Started With Cyber SecurityGetting started with cybersecurity can initially seem daunting, given the vastness and complexity of the field. However, understanding the…Nov 22, 2023Nov 22, 2023
Sentiment classificationusing Bert ModelBERT, which stands for Bidirectional Encoder Representations from Transformers, is based on Transformers, a deep learning model in which…Sep 25, 2021Sep 25, 2021
Cross-Site Scripting Vulnerabilities in Elementor Impact Over 7 Million SitesThis entry was posted in Research, Vulnerabilities, WordPress Security on March 17, 2021 by Ram GallMar 18, 20211Mar 18, 20211
Dumbest questions I’ve faced as a security enthusiast — (My story akin to Mr. Marc wickenden)Hey guy’s I would like to discuss the term “hackers”.Feb 22, 2021Feb 22, 2021
Meet the Union CommitteeCategory: Web Points: 100 (101 solves) Author: BananaManFeb 22, 2021Feb 22, 2021
Getting Into Cyber SecurityIn this tutorial I’m gonna take you through the top 5 skills you need to be learning to get into cyber security.Feb 21, 2021Feb 21, 2021
Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 VaccineHey guy’s welcome to my blog!Jan 11, 2021Jan 11, 2021
NACTF 2020 Walkthrough — CTF’s SolutionsNewark Academy CTF (NACTF) is an online jeopardy-style cybersecurity competition hosted by Newark Academy’s Computer Science ClubNov 4, 2020Nov 4, 2020