
Elevate your SOC: Key Steps to Kickstart Threat Hunting
In today’s rapidly evolving cyber landscape, the traditional, reactive approach to security just doesn’t cut it anymore. For cyber professionals […]
In today’s rapidly evolving cyber landscape, the traditional, reactive approach to security just doesn’t cut it anymore. For cyber professionals […]
What is DORA? DORA stands for the Digital Operational Resilience Act. It is the framework introduced by the European Commission […]
Hey, It’s been a busy month for me and I was not able to save time to write the final […]
Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things […]
The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the […]
Few months back, I had the opportunity to conduct two workshops at BSidesDelhi and CSI Mumbai on the above topic. […]