The weaponisation of informationFeatured
This is one win India isn’t proud of. In July, our country earned the dubious distinction of being the top source of misinformation spread during […]
This is one win India isn’t proud of. In July, our country earned the dubious distinction of being the top source of misinformation spread during […]
The new year is always a great time to set new resolutions. And a great resolution is to do things that would help on the […]
The California Consumer Privacy act In May 2018 when the General Data Protection Regulation (GDPR) came into effect, many organizations were not ready for it […]
Hey, It’s been a busy month for me and I was not able to save time to write the final part of the series on […]
What is Remote Desktop Protocol (RDP) Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a user with a graphical interface […]
This post discusses the creation of an executable which spawns a reverse Meterpreter shell. All the tools used in this post are publicly available. In […]
Attack is the secret of defense; defense is the planning of an attack. – Sun Tzu, The Art of War Ransomware have gained much notoriety […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited to, phones, routers, IoT devices, […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help of GNU Debugger (GDB). In […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the field of reverse engineering. Since […]