No post found
Best Seller
No post found
Online Courses
Book Summaries
No post found
Tech Articles
Read in Health, Fitness, Money & Relationships
Google cloud security training with Fortigate Firewall
Premise When you deploy projects containing VM instances that host your websites you have many...
Microsoft Word Remote Code Execution and System Compromise
Premise In this video, I explained how you can turn a Microsoft word file into...
Old Post – CTF Insomni hack teaser Challenge 2017 write up
This challenge requires skills both in exploit development, reverse engineering, and writing scripts using python...
Old Post – Insomni Hack Teaser 2017 forensic challenge solution
Although I could not catch up with the challenges at their time I like to...
HTML Based Exploitation with Powershell
Introduction In this video, I talked about how to create an executable HTML page that...