What Are INodes In Linux?!Learn about inodes in Linux: what they are, how to see inodes, and why they're important for exploitation and penetration testing.5d ago15d ago1
The Art of Managing Linux ProcessesLearn about Linux processes: how they work, their types, creating processes, manipulating processes, and much more.6d ago6d ago
The Linux File PermissionsLearn about the format and structure of Linux file permissions, permission classes, symbolic and binary permissions, as well as the concept…6d ago16d ago1
The Linux File SystemExplore Linux file systems, including EXT4, data blocks, super blocks, groups, bitmaps, inodes, and more…6d ago16d ago1
Windows Management for Penetration Testing Professionals🖥️Learn how to manage Windows, add or remove users from CMD, and change passwords without the current password. Also, learn about system…Feb 23Feb 23
Published inSystem WeaknessWindows Standard I/O/E In Nutshell✅Understand Windows Standard Input/Output/Error and its significance in penetration testing engagements.Feb 23Feb 23
PE Files & DLLs In WindowsDiscover what PE files and DLLs are in Windows, how they function, their structure, and the significance of DOS, along with much more…Feb 23Feb 23
Published inSystem WeaknessWindows Named Pipes In NutshellLearn about Windows Pipes, including Named Pipes and Anonymous Pipes, as well as how attackers exploit these pipes for attacks.Feb 192Feb 192
Published inOSINT TeamWhat Is Windows Internal Tokens🎫Learn about Windows tokens, how they work, the types of tokens, and their usefulness to hackers.Feb 191Feb 191
Published inSystem WeaknessWindows SID’s In Nutshell📰Learn about what a SID is in Windows, how they look, how to find SIDs, the concepts of RID and Universal SIDs, and their uses in…Feb 181Feb 181