In this video, we will be covering Binary Exploitation: Stack Overflows. The goal here in the Stack Overflow is to demonstrate my code—this is a sample code that I wrote, and I’ll upload this code to my GitHub and point …
In this short video, I would like to show you the best TryHackMe OSINT CTF Challenges that you can do to improve your OSINT skills.These OSINT challenges will harness your OSINT skills in extracting information from images, geolocate photos, gather …
In this video we will discuss Game Hacking because I recently participated in Cyberspace CTF 2024 and I came across this challenge which involves Game Hacking using “Snake” on Linux.
Containers have become essential for modern application development and deployment due to the rapidly changing tech environment. They’re also a popular target for cybercriminals too, though. Understanding container security measures is essential as organizations move towards container technologies. This article …
What is ExtensionSpoofer? ExtensionSpoofer is a versatile tool designed for anyone who wants to spoof file extensions in a creative (and sometimes deceptive) way. Using a clever technique with the right-to-left override character (U+202E), this software allows you to make …
In today’s digital world, safeguarding your online accounts, especially Facebook, is essential. Hackers are constantly developing new ways to compromise your security, but there are simple and effective steps you can take to protect your account. Here’s 7 Ways to …