PinnedCVE-2024–21413 Project: Exploiting Microsoft Outlook’s Vulnerability — A Comprehensive Penetration…A Complete Guide to Exploiting and Defending Against CVE-2024–21413Oct 15, 2024Oct 15, 2024
PinnedCreating a Simple Honeypot Project on Kali Linux: A Step-by-Step Guide with Attack SimulationIn cybersecurity, honeypots are powerful tools that attract and capture malicious activity. Honeypots are ‘fake’ systems designed to look…Oct 28, 2024Oct 28, 2024
PinnedCyber Meets Physical: A Unified Approach to Organizational SecurityIn a world where cyberattacks and physical breaches are on the rise, organizations face a tough challenge: protecting both their digital…Nov 19, 2024Nov 19, 2024
PinnedMastering Network Scanning: A Practical Guide to Nmap and MasscanNetwork scanning is the process of discovering devices and services on a computer network. It plays a crucial role in network security and…Dec 14, 2024Dec 14, 2024
PinnedSOC Lab: Building a Cybersecurity Environment for Threat Detection and DefenseCreating a home cybersecurity lab is one of the most effective ways to gain a deep understanding of network security, traffic management…Dec 4, 2024Dec 4, 2024
FlareVM: Arsenal of Tools — Defensive Security Tooling — TryHackMe WalkthroughLearn the arsenal of investigative tools in FlareVM.1d ago1d ago
Identification & Scoping — Incident Response — TryHackMe Walkthrough & InsightsA look into the second phase of the Incident Response Framework, Identification & Scoping.2d ago2d ago
picoCTF information — ForensicsChallenge Challenge- WalkthroughThis challenge involves analysing an image file and uncover hidden information embedded within it.2d ago2d ago
Yara — SOC Level 1 -Cyber Threat Intelligence — TryHackMe WalkthroughLearn the applications and language that is Yara for everything threat intelligence, forensics, and threat hunting!2d ago2d ago
Preparation —Incident Response - TryHackMe Walkthrough & InsightsA look into the Preparation phase of the Incident Response.5d ago5d ago