Uncategorized
-
Hello everyone! This is my first write-up on the Hacker101 CTF, so let’s get started. we will do the first challenge A little something to get you started click start we got this page here, There’s nothing else to do, so we can check the page source and see if we can find any useful…
-
As you all may know, Kali Linux is one of the most popular operating systems in the field of Offensive Cybersecurity used for penetration testing, ethical hacking, and digital forensics. It’s often seen as the perfect OS for beginners stepping into cybersecurity. When I first started my journey in ethical hacking, I began with Kali…
-
Windows 10 has been one of the most widely used operating systems in the world, running on millions of personal and business computers. It has been a reliable platform for daily work, gaming, and business operations. But all good things come to an end and for Windows 10, that end is approaching. From today ,…
-
Disclaimer: This content is for educational and defensive use only. Test only in isolated, offline lab environments with throwaway accounts do not run on production systems or networks. I am not responsible for misuse. Title: CVE-2025-47176 — Outlook profile / sync-path parsing abuse (non‑destructive description) IntroductionThis writeup analyzes a class of Outlook profile (.prf) abuses…
-
Alham Rizvi “ Disclaimer : Read Before Proceeding: This guide is for educational purposes only and describes findings from controlled, lab-based experiments. Do not use the information to access systems without explicit authorization. Attempting to crack passwords on live systems can lead to IP blocks, account bans, civil liability, and criminal charges” What is Hydra?…
-
Alham Rizvi “A clear understanding of the five most dangerous offensive cyber attacks that dominate today’s threat landscape. You will learn how each attack works conceptually, why it poses serious risks, and where it has been seen in real-world incidents. The content will also highlight common attacker techniques, defensive challenges, andeffective mitigation strategies. By the…
