
The weaponisation of informationFeatured
This is one win India isn’t proud of. In July, our country earned the dubious distinction of being the top […]
This is one win India isn’t proud of. In July, our country earned the dubious distinction of being the top […]
The new year is always a great time to set new resolutions. And a great resolution is to do things […]
The California Consumer Privacy act In May 2018 when the General Data Protection Regulation (GDPR) came into effect, many organizations […]
Hey, It’s been a busy month for me and I was not able to save time to write the final […]
What is Remote Desktop Protocol (RDP) Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft, which provides a […]
This post discusses the creation of an executable which spawns a reverse Meterpreter shell. All the tools used in this […]
Attack is the secret of defense; defense is the planning of an attack. – Sun Tzu, The Art of War […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the […]