Obfuscation Techniques For AntiVirus Evasion | TryHackMe Obfuscation Principles
In this post walk-through, we covered the first part of obfuscation techniques and principles for signature and…
In this post walk-through, we covered the first part of obfuscation techniques and principles for signature and…
The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site…
In this post, I will be writing the second part of TryHackMe Advent of Cyber 2024 Full…
Introduction Two prominent certifications for established blue teamers are the Certified Defensive Security Analyst (CDSA) and Blue…
Introduction The CompTIA Security+ certification is a globally recognized credential that validates foundational skills in cybersecurity. Achieving…
In this post, I will be solving and providing walkthrough and answers for Advent of Cyber 2024…
We covered the basics and fundamentals of reverse engineering using an example room from tryhackme. The post…
Introduction Two popular options for individuals at the beginning or intermediate stages of their cybersecurity journey are…
This post provides a comprehensive introduction to PowerShell, a Microsoft-developed task automation and configuration management framework. It…
For aspiring cybersecurity professionals, hands-on experience is a crucial stepping stone to mastering the field. Hack The…
As the cybersecurity landscape evolves, Security Operations Centers (SOCs) are critical in protecting organizations against sophisticated threats….
Introduction The cybersecurity landscape offers several certifications for professionals aiming to validate their penetration testing skills. Among…
The post provides an in-depth walkthrough of exploiting and enumerating MySQL Services as part of a penetration…
The TryHackMe Pre-Security Track is a comprehensive, beginner-friendly learning pathway designed to introduce users to the fundamentals…
The video provides a comprehensive walkthrough of the Windows Command Line Room on TryHackMe, aimed at teaching…
The article below provides a comprehensive guide on enhancing information retrieval techniques, particularly within the context of…
The Windows API enables direct interaction with core components of the Windows operating system, making it a…
The post provides a detailed walkthrough of using Volatility, a forensic analysis tool, to investigate a memory…
This post focuses on bypassing file upload filters to exploit vulnerabilities in web applications. It demonstrates techniques…
Introduction Two prominent certifications for aspiring blue teamers are the Certified Defensive Security Analyst (CDSA) and Blue…