Published inSystem WeaknessCreating and Hacking Slack Bots: A Deep Dive with Slack JackSlack Jack — Slack Bot Token Abuse: Purple Teaming Exercise on SlackJan 30Jan 30
Published inSystem WeaknessBuilding a T-Pot Honeypot from Scratch on Google CloudA Guide to Deploying Honeypots in the CloudJul 28, 20242Jul 28, 20242
Published inSystem WeaknessUnderstanding DLL SideloadingExploring Methods, Vulnerabilities, and OpportunitiesJul 25, 2024Jul 25, 2024
Published inSystem WeaknessBefore You Buy a Domain, Read This Blog!What You Need to Know Before You Click Purchase.Mar 14, 2024Mar 14, 2024
Published inSystem WeaknessTop Linux Keyboard Terminal Shortcuts Every User Must KnowMaster Linux Keyboard Terminal Shortcuts using this guide :)Mar 12, 2024Mar 12, 2024
Published inSystem WeaknessHow To Take Down Any Phishing Website In MinutesLet’s take down the YONO SBI Phishing website mentioned in the previous post.Mar 6, 20245Mar 6, 20245
Scammers Getting Smarter! F.T. YONO SBI Phishing ScamThis is my story of how I dodged a YONO SBI bank phishing/smishing scam.Mar 4, 2024Mar 4, 2024
Published inSystem WeaknessA Guide to Installing Tor Browser on UbuntuHere are the simple steps to easily download Tor Browser on your Ubuntu system.Feb 29, 2024Feb 29, 2024
Published inSystem WeaknessHosting a Deep Web IRC Server with Tor for Anonymous ChatA Step-by-Step Guide to creating a Private Conversations and AnonymityFeb 28, 2024Feb 28, 2024
Published inSystem WeaknessRetrieving the Base APK File from a Play Store-Installed AppThe Steps to Access and Extract the Core APK of Your Play Store AppJan 25, 2024Jan 25, 2024