An attempt to understand container runtime

An attempt to understand container runtime
Image credit
Demystifying containers with containerd
Read more →

❯ Mobile Security Notes

❯ Mobile Security Notes
Image credit
A collection of badly written notes on Android and iOS Security
Read more →

The Ultimate Guide to Phishing

The Ultimate Guide to Phishing
Learn how to Phish using EvilGinx2 and GoPhish
Read more →

I tracked the 26th Jan Farmer Protests through Snapchat

Snapchat’s Snap Map is an OSINT researcher’s goldmine
Read more →

White Paper: Understanding and Exploiting Zerologon

A paper examining the MS-NRPC protocol in detail and walk through how to exploit it.
Read more →

TryHackMe Startup

Abuse traditional vulnerabilities via untraditional means.
Read more →

TryHackMe Cod Caper

A guided room taking you through infiltrating and exploiting a Linux system.
Read more →

TryHackMe Kenobi

TryHackMe Kenobi
General Kenobi!
Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate our privileges with path variable manipulation.
Read more →