Published inOSINT TeamExtra information on Type of MemoryThis article explores Writable Memory, Non-Writable Memory, Executable Memory, and Non-Executable Memory, clarifying each type and itsβ¦2d ago12d ago1
What is a Debugger?πͺ²π’₯π·Learn what debuggers are, their types, layout, and applications. Also, discovered how to use debuggers effectively.3d ago33d ago3
Published inInfoSec Write-upsThe Stack In Operating Systemπ₯πUnderstand the stack in operating systems: its purpose, memory layout, functionality, Endianness, and Little-Endian format.4d ago44d ago4
What is Memory & How Does It Work?ππππππππππLearn about what memory is and how it functions from a hackerβs point of view, including virtual memory and memory structure.4d ago14d ago1
Published inOSINT TeamCPU Flags in Nutshell πDiscover what CPU flags are and explore some common types of flags.4d ago4d ago
Published inOSINT TeamThe CPU Register π₯Learn about CPU registers and how many there are, and go through every important register. Understanding these will help you betterβ¦5d ago15d ago1
Published inSystem WeaknessWindows Ring Level For Hackers in NutshellπͺβLearn about the different Ring levels in Windows and their importance for exploitationβ¦5d ago5d ago
What is The Kernel For Hackers?βNow, this article is going to get you an idea of what the kernel is, the structure around it, how itβs architected, and why itβs importantβ¦5d ago15d ago1
Published inSystem WeaknessLinux Run LevelsβοΈπUnderstand the run levels in Linux, and how they function, and get a guide for levels 0 to 6, along with their importance to hackers.Mar 23Mar 23
Symbolic Links in LinuxπLearn about symbolic links, their uses, soft links, hard links, and dead links, among other topicsβ¦Mar 231Mar 231
Published inInfoSec Write-upsWorking with Linux Open FilesποΈUnderstand Open Files in Linux, including the lsof command, file descriptors (FD), and the Type field.π§Mar 22Mar 22
Published inSystem WeaknessWhat Are INodes In Linux?!Learn about inodes in Linux: what they are, how to see inodes, and why they're important for exploitation and penetration testing.Feb 26Feb 26
The Art of Managing Linux ProcessesLearn about Linux processes: how they work, their types, creating processes, manipulating processes, and much more.Feb 25Feb 25
The Linux File PermissionsLearn about the format and structure of Linux file permissions, permission classes, symbolic and binary permissions, as well as the conceptβ¦Feb 25Feb 25
The Linux File SystemExplore Linux file systems, including EXT4, data blocks, super blocks, groups, bitmaps, inodes, and moreβ¦Feb 251Feb 251
Published inInfoSec Write-upsWindows Management for Penetration Testing Professionalsπ₯οΈLearn how to manage Windows, add or remove users from CMD, and change passwords without the current password. Also, learn about systemβ¦Feb 23Feb 23
Published inSystem WeaknessWindows Standard I/O/E In Nutshellβ Understand Windows Standard Input/Output/Error and its significance in penetration testing engagements.Feb 23Feb 23
Published inInfoSec Write-upsPE Files & DLLs In WindowsDiscover what PE files and DLLs are in Windows, how they function, their structure, and the significance of DOS, along with much moreβ¦Feb 23Feb 23
Published inSystem WeaknessWindows Named Pipes In NutshellLearn about Windows Pipes, including Named Pipes and Anonymous Pipes, as well as how attackers exploit these pipes for attacks.Feb 192Feb 192
Published inOSINT TeamWhat Is Windows Internal Tokensπ«Learn about Windows tokens, how they work, the types of tokens, and their usefulness to hackers.Feb 191Feb 191