Regular Expressions || TryHackMe || Free RoomsHello my friends, I am writing this post to guide and assist every aspiring individual. One of the best ways to explore cybersecurity is by…Jan 9Jan 9
Introductory Researching || TryHackMe || Free RoomsHello my friends, I am writing this post to guide and assist every aspiring individual. One of the best ways to explore cybersecurity is by…Jan 9Jan 9
Learning Cyber Security || TryHackMe || Free RoomsHello my friends, I am writing this post to guide and assist every aspiring individual. One of the best ways to explore cybersecurityJan 9Jan 9
Joern for Beginners: A How-To Guide for Source Code AnalysisThis article introduces the use of open source Joern for vulnerability mining, discussing specific tools and methods for identifying…Nov 25, 2024Nov 25, 2024
A Deep Dive Understanding of Smart Contract Vulnerabilities — Part 2Logic bugs in lending protocolsMar 30, 2024Mar 30, 2024
A Deep Dive Understanding of Smart Contract Vulnerabilities — Part 1This article serves as a mini-course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend…Mar 29, 2024Mar 29, 2024
Analyzing the Google Chrome V8 CVE-2024–0517 Out-of-Bounds Code Execution VulnerabilityOverviewFeb 24, 2024A response icon1Feb 24, 2024A response icon1
Analysis of Glibc privilege escalation vulnerability “Looney Tunables” (CVE-2023–4911)Recently, the Threat Research Unit of Qualys Company disclosed a Glibc vulnerability. The Glibc library has a buffer overflow vulnerability…Feb 21, 2024Feb 21, 2024
An In-Depth Analysis of Google Chrome Extension Vulnerabilities and SecuritySource :- https://tutorialboy24.blogspot.com/2023/11/an-in-depth-analysis-of-google-chrome.htmlNov 28, 2023A response icon1Nov 28, 2023A response icon1
Unveiling the Unauthenticated Command Execution Vulnerability in Cisco IOS XE System WebUIThis article will analyze and summarize the recent critical CVEs (CVE-2023–20198, CVE-2023–20273) in Cisco IOS XE.Nov 23, 2023Nov 23, 2023