PinnedLimaCharlie for Hackers: How to Think Like an Attacker and Defend Like a Pro — Part 1Curious about your attacker’s secrets? Why wait — learn their strategies, uncover their weaknesses, and hack them before they even see it.Nov 71Nov 71
My Journey to Becoming a Cybersecurity SOC Analyst: Defending the Digital WorldAs a student learning cybersecurity, I’ve become fascinated by the world of security operations. One area that stands out to me is working…5d ago5d ago
How to Hack Docker Container: Find Vulnerability, Exploit, and EscapeThe best way to protect something is to hack it firstNov 8Nov 8
A Complete Guide to Online Privacy: Protect Your Personal Information and Stay Safe in the Digital…“incognito mode” and “private window” are uselessOct 17Oct 17
Malware Analysis Part 4: Dynamic Memory AnalysisDynamic memory analysis involves analyzing the contents of a computer’s memory (RAM) to…Sep 17Sep 17
How to Use Wireshark to Track Log4j ExploitsIn cybersecurity, every bit and byte can tell a tale. So today, we will check out Log4j, the exploit that shook the world like a storm. We…Jan 20Jan 20
Malware Analysis Part 3: Running malware on the systemWe deeply regret any inconvenience caused by our delay in sharing the next part of the analysis. We acknowledge that there were reasons…Jul 11, 2023Jul 11, 2023
Malware Analysis Part 2: Effective Network ConfigurationWelcome back to the second part of our Malware Analysis series! In this instalment, we will explore the crucial aspects of network…Jun 20, 2023Jun 20, 2023
Malware Analysis Part 1: Setting Up the EnvironmentIn this comprehensive five-part series, we will guide you step-by-step from being a complete beginner to setting up your own malware…Jun 7, 20231Jun 7, 20231
An Introduction to Blue Teaming: Understanding the Basics“Blue teaming is not just a job, it’s a mindset. With every incident, we learn, we adapt, and we become better defenders.”May 9, 2023May 9, 2023