top of page
5 min read
Mobile Telecom Networks for Hackers, Part 1: Getting Started with Mobile Networks
Welcome back, my aspiring cyberwarriors! The world is rapidly becoming dominated by mobile cellular networks. Not long ago, telecom...
659 views
5 min read
Reverse Engineering Malware: Cactus Ransomware, Basic Static Analysis
Ransomware is always evolving, and Cactus is no exception. When I came across this sample, I knew it was worth a closer look. It’s built...
402 views
6 min read
Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
4,982 views
4 min read
Cryptography Basics for Hackers, Part 4: Building a Simple Encryption Algorithm in Python
Welcome back, my aspiring cyberwarriors! Cryptography is one of foundational technologies of cybersecurity. It helps to keep our...
492 views
3 min read
Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
255 views
5 min read
Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
330 views
5 min read
Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities
Welcome back, my aspiring cyberwarriors! Finding vulnerabilities in applications and services is the first step toward developing your...
1,022 views
5 min read
Exploit Development: Building Your Own Fuzzer with BASH
Welcome back, my aspiring cyberwarriors! In the digital battleground of cybersecurity, web application fuzzing stands as a critical...
889 views
2 min read
SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
1,988 views
5 min read
Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
1,371 views
bottom of page