Published inInfoSec Write-upsIntroduction to Blue Teaming OperationsBlue Team Operations : Educational Series (Part-1)Sep 12, 2023Sep 12, 2023
Published inInfoSec Write-upsBlue Team Operations : Educational SeriesEnhancing Cyber Defense Proficiency through Comprehensive Blue Team OperationsSep 7, 20231Sep 7, 20231
Published inInfoSec Write-upsReverse Engineering: Injection Series Part 4 — Blue Team LabsReverse engineer the given file and understand the behavior. You can use any disassembler you like to complete this challenge.Aug 15, 2023Aug 15, 2023
Published inInfoSec Write-upsReverse Engineering a binary with IDA FreeLearn how to reverse engineer a basic level binary to get a password.May 19, 2023May 19, 2023
Published inInfoSec Write-upsMalicious Excel Document Malware AnalysisHow an excel document can hack you in a seconds..Apr 15, 20231Apr 15, 20231
Published inInfoSec Write-upsIntroduction to M4lw@r3 Analysis — What should you know ?It is what it is, but what it is 😁Mar 8, 2023Mar 8, 2023
Published inInfoSec Write-upsCyberVerse — Introducing a Cyber Security CommunityIntroduction to CyberVerse, A Cyber Security Community Discord ServerFeb 10, 20231Feb 10, 20231
Published inInfoSec Write-upsTCM Security “Academy” — WalkthroughWalkthrough on TCM Security Academy machine challengeDec 18, 2022Dec 18, 2022
Published inInfoSec Write-upsFaster your NMAP scan with “Agile Grabber”Make your scan faster in CTFs to save time on scanning.Oct 24, 2022Oct 24, 2022
Published inInfoSec Write-upsUnderstanding the NMAP methodology — Part 3Understanding the NMAP methodology from beginner to advanceSep 28, 2022Sep 28, 2022