windows Reading and Writing into Process's Memory Get the basic understanding on the remote process memory read and write all by windows 32 API and create your own game hacks.
linux Introduction to Linux for Developers Get an introductory knowledge of what Linux is and your best friend man page. You will also learn about the components that make GUI possible
windows Dump Information for Process using GetTokenInformation In this post, you will get a very thorough step-by-step walkthrough on building your own process token dumper in the c++ which will help you in knowing your target better before launching another post exploitation attack.
python Perform Basic Image Processing using Python3 and OpenCV Computer vision is a field of AI that enables machines to derive meaningful information from visual data like images and videos. In this post, you will get acquainted with the basics of image processing via the OpenCV library in python to change colour, resize an image etc
python Cracking Zip Password using Python 3 and Multithreading Learn the basics of a multithreading program using python 3 and how to crack a zip file password efficiently in a gamified manner.
python Cracking Zip Password using Python3 Get a thorough knowledge of python's zipfile module and build your own Zip file password cracking tool in less than 3 minutes
process-injection Understanding Address Spacing in Detail Address spacing is used in all the Operating Systems to manage the processes' memory. Virtual address spacing opened the door for more features like swapping and easy relocations of the instructions and data to prevent address tampering.
windows Windows Process Listing using NTQuerySystemInformation Get acquainted with the undocumented low-level yet powerful APIs from winternls and how to use the NtQuerySystemInformation function to get a list of all the processes running in the system
windows Windows Process Listing Using PSApi Get a detailed walkthrough on process listing via PSApi. You will also learn about its pros-n-cons and the new set of functions from the PS Api suite related to module enumeration.
windows Windows Process Listing using ToolHelp32 API Get a detailed walk-through on the code of process listing using ToolHelp32 API from scratch. You will also learn to enumerate the threads and modules for each process and will know about its advantages and challenges
windows Windows Process Listing Using WTS API – Part 2 In this post, you will learn how to gracefully enable SeDebugPrivilege and automatically launch the process using ShellExecuteExA with administrator privileges. This is in continuation to part 1 of windows process listing using wts api.
windows Windows Process Listing Using WTS API – Part 1 In this detailed walkthrough of process listing using WTS API, you will learn the importance of the process listing and enumeration of anti-malware agents and will get your hands dirty with the source code
apparmor Mitigating the Damage in the Compromised Webserver using AppArmor In this post, you will get a very (very) detailed tutorial on how to confine the resource for an nginx server and the php fpm service on a compromised server to allow specific commands via webshell
windows Loading DLLs using C++ in Windows This standalone tutorial will guide you through writing your own DLL library from scratch and loading it into C++ and calling the exported functions in a separate project.
access-control Confining Resources inside Docker Containers with AppArmor Can docker containers be protected via AppArmor? Well yes, they can and in fact, they are already being protected by apparmor in your serves. Learn more about how docker and apparmor works and make your existing docker setup more secure
apparmor Writing AppArmor Profile from Scratch Get a detailed walkthrough about writing the profile for a custom binary from scratch using AppArmor utilities like aa-genprof and aa-autodep
access-control Disallowing CAP_NET_RAW Capability for Root User using AppArmor Is root the ultimate user in Linux? You will get the answer to this question in a post by confining the cap_net_raw for ping command using AppArmor
linux Understanding AppArmor Kernel Enhancement AppArmor is an old, yet powerful security feature introduced in the Linux kernel in the late '90s to control resources for running programs rather than users. It can be used to easily mitigate the damage caused by adversaries. Learn the basics of the AppArmor and its components
python Introduction to Tensors in Pytorch #2 In this second part of the tensor with PyTorch, I will guide you through some advanced operations on the tensors and matrices from slicing to matrix multiplication or vector operations
maths Introduction to Tensors in Pytorch #1 Tensors are the building block of neural networks and are used to represent the data in form of numbers. In this post you will learn the basics of tensors like declaring, types and shapes
csharp Encrypted TCP Command and Control Learn how to perform command and control under the radar using the encrypted tunnel in such a way the keys are exchanged dynamically over the network leaving no trace on the system. and also bypassing the windows defender and other anti-malware or NIPS/NIDS services like Snort.
bruteforce Smartly Detect and Crack Password Hashes using JohnTheRipper No doubt hashcat is a good tool but what if you want to crack the encrypted document files like pdf or archive zip and smartly detect the hash type. John the ripper at your disposal for such things. You will learn about the basics of the JohnTheRipper suite in this post.
bruteforce Brute forcing Password with Hashcat Mask Method Take a step further in hashcat bruteforcing and learn how to perform a mask attack on the password length when provided the minimum and maximum length and charset of the passwords
metasploit Exploit WebDAV using Metasploit WebDAV is an extension to the HTTP protocol that allows users to upload, move or change the documents on the server via HTTP verbs. In this post learn how to exploit WebDAV using Metasploit
csharp Execute Unmanaged Code via C# PInvoke An unmanaged code is one that is written outside the DotNet framework which is allowed to be executed at runtime. In this, you will learn how to use C# and DotNet to execute a shellcode crafted from Metasploit.