This video showcases a tool named Xeuledoc that can extract metadata from publicly shared Google documents such as Docs, Sheets, and Slides.
This video explains the concept of return-to-libc attacks in binary exploitation. The discussion focuses on how to exploit a vulnerable program using the ‘libc’ library to execute a shell without directly calling system functions in the code.
This tutorial teaches you how to decrypt SSL/TLS traffic using the SSL key log file environment variable on various operating systems, including Linux, Windows, and Mac. You will learn the significance of decrypting traffic for both attackers and defenders, and …
The advent of Generative AI has revolutionized numerous domains including cybersecurity. Generative AI is a type of artificial intelligence that can create new content, such as text, code, images, and music. It is trained on massive datasets of existing content, …
In this video, We’ll explore how direct system calls can be used to bypass API Hooking technique used by modern EDRs/AVs to block malicious in-memory attacks, Make sure to leave a like if you enjoyed it and learnt something new!
Cyber attacks are increasing and advancing by the day, along with their costs. In fact, a study by Field Effect highlighted that the average cost of a data breach in 2024 was about $4.88 billion, a 10% increase from 2023. …