In this video we will discuss Game Hacking because I recently participated in Cyberspace CTF 2024 and I came across this challenge which involves Game Hacking using “Snake” on Linux.
Introduction to Volatility Framework. In this video we will explore how to use Volatility to analyze your computer’s memory snapshot and uncover hidden clues about what’s been happening on it.
VHOST Enumeration with Gobuster and FFUF. In this video I’ll showcase the methods to effectively enumerate virtual hosts using two powerful tools: Gobuster and FFUF. This guide is going to help you to enhance your skill in identifying and enumerating …
In this video you will be shown how you can perform Kerberoasting and ASREPRoasting using the help of Rubeus.
In this video you will be shown how you can use URL file attacks to gain access.
This is a how-to guide to using John the Ripper to master password cracking. John the Ripper is an Open Source password security auditing and password recovery tool available for many operating systems. John the Ripper also supports hundreds of …