Privilege escalation on Linux
When it’s good and when it’s a disaster
When it’s good and when it’s a disaster
A handy cheatsheet on DNS
A Tutorial Blog on how to check for CSRF Vulnerability
Hackers Using Weaponized PDF To Deliver Remcos RAT Malware on Windows
An Ethical Hackers Guide for Getting from Beginner to Professional
Blog on SQLite Essentials and Attack Strategies
Understanding P, NP, and NP-Complete, The Backbone of Computational Complexity
The Next.js Middleware Authorization Bypass Vulnerability
A blog series featuring metasploit tutorials from scratch
A curated list of the coolest and most in-demand cybersecurity careers