Regular Expressions || TryHackMe || Free RoomsHello my friends, I am writing this post to guide and assist every aspiring individual. One of the best ways to explore cybersecurity is by…Jan 9Jan 9
Introductory Researching || TryHackMe || Free RoomsHello my friends, I am writing this post to guide and assist every aspiring individual. One of the best ways to explore cybersecurity is by…Jan 9Jan 9
Learning Cyber Security || TryHackMe || Free RoomsHello my friends, I am writing this post to guide and assist every aspiring individual. One of the best ways to explore cybersecurityJan 9Jan 9
Joern for Beginners: A How-To Guide for Source Code AnalysisThis article introduces the use of open source Joern for vulnerability mining, discussing specific tools and methods for identifying…Nov 25, 2024Nov 25, 2024
A Deep Dive Understanding of Smart Contract Vulnerabilities — Part 2Logic bugs in lending protocolsMar 30, 2024Mar 30, 2024
A Deep Dive Understanding of Smart Contract Vulnerabilities — Part 1This article serves as a mini-course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend…Mar 29, 2024Mar 29, 2024
Analyzing the Google Chrome V8 CVE-2024–0517 Out-of-Bounds Code Execution VulnerabilityOverviewFeb 24, 20241Feb 24, 20241
Analysis of Glibc privilege escalation vulnerability “Looney Tunables” (CVE-2023–4911)Recently, the Threat Research Unit of Qualys Company disclosed a Glibc vulnerability. The Glibc library has a buffer overflow vulnerability…Feb 21, 2024Feb 21, 2024
An In-Depth Analysis of Google Chrome Extension Vulnerabilities and SecuritySource :- https://tutorialboy24.blogspot.com/2023/11/an-in-depth-analysis-of-google-chrome.htmlNov 28, 20231Nov 28, 20231
Unveiling the Unauthenticated Command Execution Vulnerability in Cisco IOS XE System WebUIThis article will analyze and summarize the recent critical CVEs (CVE-2023–20198, CVE-2023–20273) in Cisco IOS XE.Nov 23, 2023Nov 23, 2023