This video showcases a tool named Xeuledoc that can extract metadata from publicly shared Google documents such as Docs, Sheets, and Slides.
This video explains the concept of return-to-libc attacks in binary exploitation. The discussion focuses on how to exploit a vulnerable program using the ‘libc’ library to execute a shell without directly calling system functions in the code.
This tutorial teaches you how to decrypt SSL/TLS traffic using the SSL key log file environment variable on various operating systems, including Linux, Windows, and Mac. You will learn the significance of decrypting traffic for both attackers and defenders, and …
The advent of Generative AI has revolutionized numerous domains including cybersecurity. Generative AI is a type of artificial intelligence that can create new content, such as text, code, images, and music. It is trained on massive datasets of existing content, …
In this video, We’ll explore how direct system calls can be used to bypass API Hooking technique used by modern EDRs/AVs to block malicious in-memory attacks, Make sure to leave a like if you enjoyed it and learnt something new!
In this guide, we’re going to break down the SOC 2 compliance myths and reveal the truth behind what it takes to protect your business and build trust with your customers. You’ll learn how to position your organization as a …