TECHNICAL Exploiting With Eternal Blue Learn how to exploit operating system-level vulnerabilities and gain root on the target machine with External Blue.
TECHNICAL Hacker 101 CTF: Photo Gallery A technical writeup of the hacker101 ctf (photo gallery). It containts the answers, so do not read if you are working on it.
TECHNICAL TryHackMe WriteUp - Simple CTF If you are a beginner who wants to learn about CTF's, this TryHackMe room is perfect for you!
TECHNICAL Security as Code: Writing security requirements in Gherkin An easy DevSecOps methodology to inject security requirements inside an application's repository.
TECHNICAL TryHackMe Walkthrough - A Common Linux Privilege Escalation This Beginner-friendly Walkthrough is based on TryHackMe Platform Room “Common Linux Privilege Escalation”
TECHNICAL WU02 TryHackMe- Basic Pentesting A writeup of the Basic Pentesting Room on the TryHackMe Platform.
TECHNICAL Running Kali Linux On Windows Without A Hypervisor Using WSL2 How to set up Kali Linux on Windows 10 without a Hypervisor.
TECHNICAL Data Destruction 101 This article will teach you everything you need to know to cover your digital traces when using Windows.
TECHNICAL HTB Sauna Walkthrough Welcome to the HackTheBox Sauna walkthrough, a technical how-to guide to hacking the Sauna box.
TECHNICAL HTB Book Walkthrough Welcome to another of my HackTheBox walkthroughs, today we are going to tackle the Book box!
TECHNICAL Buffer Overflow #1: Introduction Welcome to part one in Gurkirat Singh's buffer overflow series where he gently introduces the subject.
TECHNICAL Cybersecurity for Beginners - Part 5: Command & Control Part five in Andy from Italy's series on cybersecurity for beginners!
TECHNICAL HTB Monteverde Walkthrough A technical walk through of hacking the Monteverde box on HackTheBox!
TECHNICAL Windows Forensics: Artifacts (2) We continue our digital forensics journey with Windows artifacts, so let's jump right in and continue to look for artifacts in Windows!
TECHNICAL HTB Obscurity Walkthrough King of the walkthrough's Andy from Italy is back with another technical explanation of how he cracked the HackTheBox Obscurity box.
TECHNICAL HTB OpenAdmin Walkthrough Welcome to another of my technical HackTheBox walk throughs, this time we take on HTB OpenAdmin.
TECHNICAL Understanding NoSQL Injection and How to Prevent it An injection is a security vulnerability that lets attackers take control of database queries. There is only one thing you can do, "SANITIZATION"
TECHNICAL Cybersecurity for Beginners - Part 3: Weaponization Part three in Andy's Cybersecurity For Beginners series. In this episode he enthusiastically covers weaponization.