PinnedUS Gov says ‘Don’t use a VPN’. Can you trust them?The U.S. government has long argued for backdoors in our communications for security purposes, but this strategy has now backfired. Privacy…Jan 15Jan 15
PinnedHow to Build a Home Lab in 5 MinutesDo you know how to build a home lab in just 5 minutes? If not, let me walk you through the process step by step. A home lab consists of…Jan 15Jan 15
HOW to be a SOC analyst in a Year — No (BS) zbyteAs a student learning cybersecurity, I’ve become fascinated by the world of security operations. One area that stands out to me is working…Nov 13, 2024Nov 13, 2024
How to Hack Docker Container: Find Vulnerability, Exploit, and EscapeThe best way to protect something is to hack it firstNov 8, 2024Nov 8, 2024
Detection &Response Rules | D&R | LimaCharlie | zbyteCurious about your attacker’s secrets? Why wait — learn their strategies, uncover their weaknesses, and hack them before they even see it.Nov 7, 20241Nov 7, 20241
The Ultimate Guide to Online Privacy: Data, Tracking, and Protection Strategies“incognito mode” and “private window” are uselessOct 17, 2024Oct 17, 2024
Malware Analysis Part 4: Dynamic Memory AnalysisDynamic memory analysis involves analyzing the contents of a computer’s memory (RAM) to…Sep 17, 2024Sep 17, 2024
How to Use Wireshark to Track Log4j ExploitsIn cybersecurity, every bit and byte can tell a tale. So today, we will check out Log4j, the exploit that shook the world like a storm. We…Jan 20, 2024Jan 20, 2024
Malware Analysis Part 3: Running malware on the systemWe deeply regret any inconvenience caused by our delay in sharing the next part of the analysis. We acknowledge that there were reasons…Jul 11, 2023Jul 11, 2023
Malware Analysis Part 2: Effective Network ConfigurationWelcome back to the second part of our Malware Analysis series! In this instalment, we will explore the crucial aspects of network…Jun 20, 2023Jun 20, 2023