Study Notes

No post found

Best Seller

No post found

Online Courses

The Complete Penetration Testing with Backbox Linux Course
The Complete Practical Web Application Penetration Testing Course
Windows Privilege Escalation Techniques Course
Splunk SIEM Full Course with Practical Scenarios
Full Splunk SIEM Practical Course | Arabic Language
The Complete Practical Metasploit Framework Course
Free Cybersecurity training videos

Book Summaries

No post found

Read in Health, Fitness, Money & Relationships

Fortigate Fortinet Firewall Google cloud training

Google cloud security training with Fortigate Firewall

Premise When you deploy projects containing VM instances that host your websites you have many...
Microsoft Word Remote Code Execution and System Compromise

Microsoft Word Remote Code Execution and System Compromise

Premise In this video, I explained how you can turn a Microsoft word file into...
CTF Insomni hack teaser Challenge 2017 write up

Old Post – CTF Insomni hack teaser Challenge 2017 write up

This challenge requires skills both in exploit development, reverse engineering, and writing scripts using python...
Insomni HackerTeaser 2017 forensic challenge solution

Old Post – Insomni Hack Teaser 2017 forensic challenge solution

Although I could not catch up with the challenges at their time I like to...
HTML Based Exploitation with Powershell - Motasem Hamdan

HTML Based Exploitation with Powershell

Introduction In this video, I talked about how to create an executable HTML page that...