Lumma Malware Analysis with ANY.RUN
Introduction to Lumma Malware Lumma is a powerful information stealer malware designed to extract sensitive data from…
Mastermind Study Notes is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, Motasem Hamdan, who is a Cybersecurity content creator and YouTuber.
Introduction to Lumma Malware Lumma is a powerful information stealer malware designed to extract sensitive data from…
Introduction to HackTheBox Armaxis The “Armaxis” challenge from the HackTheBox University CTF 2024 involves exploiting vulnerabilities in…
Insidious (2010) Chapter 1 Recap & Review Josh and Renai Lambert (Patrick Wilson and Rose Byrne) move…
This article explores cybersecurity flaws in dating apps, specifically injection attacks and cross-site scripting (XSS) exploits. The…
This article provides an in-depth analysis of the Risen ransomware, a malicious software designed to encrypt user…
Introduction to HackTheBox APT In this article, we covered various aspects of Active Directory Penetration Testing using…
This article covers enumerating and exploiting FTP in the TryHackMe Network Services room, part of the CompTIA…
In this article, we covered threat intelligence concepts and how to use the threat intelligence platform AlientVault…
HTTP Header (X-Forwarded-For) 🔹 What is the X-Forwarded-For Header? 🔹 The Exploit 🔹 Steps to Exploit Prevention…
This article explores how VOIP web applications, specifically MagnusBilling, can be exploited using simple command-line techniques. This…
Introduction This article presents detailed practical steps for ethical hacking penetration testing. The goal is to guide…
Plot Summary ​Zero Day is a six-part political thriller series that premiered on Netflix on February 20,…
The article is an in-depth forensics guide on how to analyze the NTFS (New Technology File System)…
This article discusses data exfiltration techniques using the HTTP protocol, explaining why HTTP is one of the…
This article is a deep dive into Telnet, covering enumeration, exploitation, penetration testing and security concerns related…
Book Summary Robert Greene’s The 48 Laws of Power is a widely recognized guide to understanding and…
​Managing advertising costs is a common challenge for small businesses, especially when using platforms like Google Ads….
Introduction to TryHackMe SAL1 Certification The SAL1 is an entry-level certification introduced by TryHackMe, aimed at individuals…
Plot Summary The Marked Heart (Palpito) is a Colombian thriller series on Netflix that revolves around organ…
Introduction This article outlines a comprehensive guide for learning cybersecurity on your own, particularly for beginners aiming…