An attempt to understand container runtime

An attempt to understand container runtime
Image credit
Demystifying containers with containerd
Read more →

❯ Mobile Security Notes

❯ Mobile Security Notes
Image credit
A collection of badly written notes on Android and iOS Security
Read more →

The Ultimate Guide to Phishing

The Ultimate Guide to Phishing
Learn how to Phish using EvilGinx2 and GoPhish
Read more →

I tracked the 26th Jan Farmer Protests through Snapchat

Snapchat’s Snap Map is an OSINT researcher’s goldmine
Read more →

White Paper: Understanding and Exploiting Zerologon

A paper examining the MS-NRPC protocol in detail and walk through how to exploit it.
Read more →