Database Hacking
Blog on SQLite Essentials and Attack Strategies
Blog on SQLite Essentials and Attack Strategies
Understanding P, NP, and NP-Complete, The Backbone of Computational Complexity
The Next.js Middleware Authorization Bypass Vulnerability
A blog series featuring metasploit tutorials from scratch
A curated list of the coolest and most in-demand cybersecurity careers
Everything You Need to Know about XZ Utils Backdoor
Blog on Most Common IDS Evasion Techniques
Detailed Incident analysis on Bybit Hack
Detailed blog about ARP Cache Poisoning and how to prevent it
Detailed blog about LLMNR Poisoning and how to prevent it in AD