3d ago Β· 6 min read Β· CAPA: The Basics β Identifying Malware Capabilities Using Static Analysis Introduction Analyzing potentially malicious software can be risky. If malware is executed on a normal system, it may compromi
Join discussionMar 1 Β· 4 min read Β· π‘οΈ Incident Response Fundamentals β TryHackMe Write-Up Cyber security incidents are no longer rare events β they are part of everyday organizational risk. In this room, Incident Response Fundamentals
Join discussionFeb 26 Β· 4 min read Β· π Shells in Offensive Security β Complete Overview & Practical Walkthrough Shells play a crucial role in offensive security. Whether you're performing penetration testing or analyzing attacker behavi
Join discussionFeb 25 Β· 4 min read Β· π Mastering Gobuster: A Beginner-Friendly Guide to Web Enumeration If you're stepping into the world of cybersecurity, reconnaissance is one of the most crucial phases you'll encounter. One powerful
Join discussionFeb 24 Β· 3 min read Β· Burp Suite: The Basics β A Beginnerβs Guide to Web Application Pentesting Introduction Welcome to Burp Suite Basics π If you are stepping into the world of web application penetration testing, Burp S
Join discussion