The Dark Side of PDFs, Understanding and Protecting Against Malicious Exploits

Table of Contents Introduction PDF Structure PDF Injection: Exploiting Popup Windows <a href="#the-alertkhafa...
Published on May 26, 2024 | 5 min read

Splunk Exploring SPL

IntroductionSplunk SPL is the language used in Splunk, a robust SIEM solution for searching and exploring machine data. Search Processing Language (SPL) enhances search effectiveness by combining various functions and commands to create optimized and complex search ...
Published on December 14, 2023 | 7 min read

Phishing Analysis Fundamentals

IntroductionExplore the fundamentals of phishing analysis in this comprehensive journey, covering the intricacies of email addresses, delivery mechanisms, headers, body content, and various types of phishing attacks.Explore these concepts in a hands-on way ...
Published on December 12, 2023 | 4 min read

Exploring the Phishing Mail Analysis Insights from Let's Defend

Greetings, cybersecurity enthusiasts! In this detailed examination, we venture into the intricate realm of phishing mail analysis through two compelling challenges brought ...
Published on December 07, 2023 | 1 min read

Exploit vulnerability to bypass login windows 11, 10 , 8.1 and 7

Forgot your Windows 11 password? Using your laptop some time ago and can’t remember the password now? If you have previously created a password reset disk, you can get in w...
Published on March 29, 2023 | 2 min read

Traffic Sign Detection V-Eye Project

Introduction:The V-Eye project aims to help blind people by providing assistance in identifying important objects in their surroundings. This code snippet demonstrates the use of a simple traffic sign detection system that could be integrated into the V-Eye project...
Published on March 20, 2023 | 7 min read

Emotions Detection to Assist Blind People V-Eye Project

Introduction:The V-Eye project is a system that aims to help visually impaired people to perceive the emotions of the people they interact with in their daily lives. The system uses a camera to capture the facial expressions of people, and a deep l...
Published on March 20, 2023 | 8 min read

Color Detection for Blind People using OpenCV V-Eye Project

Introduction:The goal of this project is to help visually impaired individuals to identify colors by using OpenCV to detect colors in real-time. This project aims to provide a user-friendly and efficient solution to assist blind people in their dai...
Published on March 10, 2023 | 7 min read

D-Link DSL-224 VDSL2 ADSL2 Wireless N300 Router information disclosure vulnerability

Introduction:As an ethical hacker, I am always on the lookout for potential security vulnerabilities that could compromise the security of my de...
Published on February 15, 2023 | 1 min read

Reflected XSS vulnerability in nokia subdomain website

Hello, Hackers Welcome to my write-up of Nokia Hacked with RXSS VulnerabilityThis time Nokia is my targetAnd I discov...
Published on January 03, 2023 | 0 min read

Exploiting Cross Site Scripting XSS

Hello Hackers,I started my bug-hunting journey and got an XSS.While hunting on a Website (Vulnerability not fixed yet) let’s say example.com I searched for input places. The Website is designed for booking hotels, rooms, etc. So I started searching for a wonderful expensive hotel...
Published on December 12, 2022 | 1 min read

OverTheWire(Bandit) Write-Ups

IntroductionThe Bandit wargame is aimed at absolute beginners. It will teach the basics needed to be able to play oth...
Published on April 03, 2022 | 54 min read