Unsupervised Text Classification in PowerShell :Part 1Text classification or text analysis is one of the growing fields in the IT world. Cyber Security is not an exception, especially in…Oct 17, 2021Oct 17, 2021
The Threat Hunting Hypothesis Defined ?Human intelligence gives us the liberty of interpreting things as per our own will and understanding. This is the drawback of our…Oct 10, 2021Oct 10, 2021
Simple DarkWeb Monitoring Bot with TelegramOne of the aspects of threat hunting is to look for data breaches and leaks that happen on the dark web. Good threat hunter keeps looking…Aug 29, 2021Aug 29, 2021
RE-loaded : THM rooms HintsRE-loaded : THM Room Write Up Hi Folk i have created room for zero-hero RE challenge room on THM. Currently room is hosting on 4…Jan 10, 2021Jan 10, 2021
ShellCoding : The syscall dilemmaShellcoding or simply exploit writing depends heavily the on syscall or system call for their success. OS architecture is designed in such…Nov 14, 2020Nov 14, 2020
Token Impersonation PrivEsc: C++ CodeIt was suppose to be a part of my malware programming series but unfortunately i am unable to create a whole blog series. Never minds lest…Oct 10, 2020Oct 10, 2020
Quick DFIR & TH :: File System TunnelingHello, every one writing after a long time . This time i have decided to brief you all about interesting concepts of the DFIR and TH very…Jul 11, 2020Jul 11, 2020
Bro log file analysis using Python and PandasIn the world of cybersecurity, we have multiple Dimensions to deal with. Among this, there is a log analysis, which is a crucial part of…Feb 16, 2020Feb 16, 2020
0x00 Basics of Reverse Engineering: StackI fell in love of reverse engineering after watching a video of buffer overflow exploit explanation by computerphile. They have explained…Sep 23, 20191Sep 23, 20191
NetCat & Cache Level Attacks ExplainedCache attacks are one of the mots formidable attacks ever developed againts any system, recent progress In this class of attacks made it…Sep 18, 2019Sep 18, 2019