A Deep Dive into Kerberoasting: OSCP Edition
A concise guide to Kerberoasting, a powerful technique for compromising AD service accounts.
A concise guide to Kerberoasting, a powerful technique for compromising AD service accounts.
How I found missing SRI using just curl and how it led to my first valid bug.
A Handy cheatsheet that you might require while writing some cool exploit scripts
Detailed blog on how to use the proxy configuration tool to stay anonymous
A Place to recall and revisit all the popular NMap commands
Deepdive into life of Aaron Swartz, the founder of reddit
A list of 60 most used linux commands for beginners
An exploration of data exfiltration methods using VNC, from common clipboard theft to advanced steganography techniques.
An in-depth analysis of the OWASP Top 10 for 2025, highlighting new categories, shifts in vulnerability rankings.
An Overview on malware propagation techniques, covering infection vectors, lateral movement, and persistence strategies.