Powershell-Backdoor-Generator is a reverse backdoor written in Powershell and obfuscated with Python. Allowing the backdoor to have a new signature after…
Browsing: Ethical hacking
I can’t even fit this into one title. It’s that complex. In sum, I used ChatGPT to automate finding companies…
Today I want to look at the methodology when attacking web login portals. I see many posts about different vulnerabilities…
Subdomain hacking is a cyber attack that involves exploiting vulnerabilities in subdomains to gain unauthorized access to a website or…
Hello, fellow Bug Hunters! It’s me again Jefferson Gonzales, and in this article, I’ll tell you about how I got my…
ChatGPT can’t replace skilled threat actors — at least not yet — but security researchers say there is evidence that…
The SSH private key code should not be just a decoration. Unfortunately, some people think they will never lose their…
Hacking has been a popular topic in recent years, with more and more individuals becoming interested in the world of…
Hello World! I haven’t posted a writeup in a long time.Since the middle of 2022, I’ve been devoting my time…
Reverse engineering is the process of analyzing and understanding a system, product, or component in order to determine how it…
These days, it seems that hardly a week goes by without at least one report of a data breach. A store may…
Cross-Site Scripting (XSS) is a type of security vulnerability in web applications that allows an attacker to inject malicious scripts…
According to MITRE, “Adversaries can use the COM system to insert malicious code that can be executed in place of…
Keyloggers, as the word itself suggests, function by logging or capturing keys or key strokes. Technically, a keylogger is a software tool or…