Published inOSINT TeamExtra information on Type of MemoryThis article explores Writable Memory, Non-Writable Memory, Executable Memory, and Non-Executable Memory, clarifying each type and its…2d ago10012d ago1001
What is a Debugger?🪲𖢥🕷Learn what debuggers are, their types, layout, and applications. Also, discovered how to use debuggers effectively.3d ago10133d ago1013
The Stack In Operating System🖥📟Understand the stack in operating systems: its purpose, memory layout, functionality, Endianness, and Little-Endian format.4d ago10944d ago1094
What is Memory & How Does It Work?𝄃𝄃𝄂𝄂𝄀𝄁𝄃𝄂𝄂𝄃Learn about what memory is and how it functions from a hacker’s point of view, including virtual memory and memory structure.4d ago9214d ago921
Published inOSINT TeamCPU Flags in Nutshell 🗄Discover what CPU flags are and explore some common types of flags.4d ago504d ago50
Published inOSINT TeamThe CPU Register 🖥Learn about CPU registers and how many there are, and go through every important register. Understanding these will help you better…5d ago10015d ago1001
Published inSystem WeaknessWindows Ring Level For Hackers in Nutshell🪟⭕Learn about the different Ring levels in Windows and their importance for exploitation…5d ago115d ago11
What is The Kernel For Hackers?⚛Now, this article is going to get you an idea of what the kernel is, the structure around it, how it’s architected, and why it’s important…5d ago5015d ago501
Published inSystem WeaknessLinux Run Levels⚙️🏃Understand the run levels in Linux, and how they function, and get a guide for levels 0 to 6, along with their importance to hackers.Mar 2352Mar 2352
Symbolic Links in Linux🔗Learn about symbolic links, their uses, soft links, hard links, and dead links, among other topics…Mar 2321Mar 2321
Published inInfoSec Write-upsWorking with Linux Open Files🗂️Understand Open Files in Linux, including the lsof command, file descriptors (FD), and the Type field.🐧Mar 2253Mar 2253
Published inSystem WeaknessWhat Are INodes In Linux?!Learn about inodes in Linux: what they are, how to see inodes, and why they're important for exploitation and penetration testing.Feb 26Feb 26
The Art of Managing Linux ProcessesLearn about Linux processes: how they work, their types, creating processes, manipulating processes, and much more.Feb 251Feb 251
The Linux File PermissionsLearn about the format and structure of Linux file permissions, permission classes, symbolic and binary permissions, as well as the concept…Feb 2524Feb 2524
The Linux File SystemExplore Linux file systems, including EXT4, data blocks, super blocks, groups, bitmaps, inodes, and more…Feb 2531Feb 2531
Windows Management for Penetration Testing Professionals🖥️Learn how to manage Windows, add or remove users from CMD, and change passwords without the current password. Also, learn about system…Feb 2320Feb 2320
Published inSystem WeaknessWindows Standard I/O/E In Nutshell✅Understand Windows Standard Input/Output/Error and its significance in penetration testing engagements.Feb 23Feb 23
PE Files & DLLs In WindowsDiscover what PE files and DLLs are in Windows, how they function, their structure, and the significance of DOS, along with much more…Feb 23Feb 23
Published inSystem WeaknessWindows Named Pipes In NutshellLearn about Windows Pipes, including Named Pipes and Anonymous Pipes, as well as how attackers exploit these pipes for attacks.Feb 19282Feb 19282
Published inOSINT TeamWhat Is Windows Internal Tokens🎫Learn about Windows tokens, how they work, the types of tokens, and their usefulness to hackers.Feb 19821Feb 19821