
Autonomous AI Pen Testing: When Your Security Tools Start Thinking for Themselves
As we navigate the evolving cybersecurity landscape of 2025, autonomous AI penetration testing stands at the fascinating intersection of artificial […]
As we navigate the evolving cybersecurity landscape of 2025, autonomous AI penetration testing stands at the fascinating intersection of artificial […]
Artificial Intelligence is spreading its influence far and wide, impacting nearly every aspect of our lives, including cybersecurity. But let’s […]
This post discusses the creation of an executable which spawns a reverse Meterpreter shell. All the tools used in this […]
Attack is the secret of defense; defense is the planning of an attack. – Sun Tzu, The Art of War […]
The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the […]
Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a […]