Skip to content
0xLuk3
Menu
BLOG
ABOUT ME
CERTIFICATIONS
[CTF Challenges]
PROJECTS
CONTACT
RESOURCES
Month:
September 2024
0xLuk3
>>
Read More
September 27, 2024
September 27, 2024
0xLuk3
0xLuk3
Hide secret data inside an image or audio file
Hey there! Suppose you have downloaded a .jpeg image from the World Wide Web and suspect…
0 Comments
Read More
September 25, 2024
September 25, 2024
0xLuk3
0xLuk3
Encoding and encryption
Encoding and encryption are used interchangeably. Encryption involves encoding data for confidentiality and security, while…
0 Comments
Read More
September 12, 2024
September 12, 2024
0xLuk3
0xLuk3
9 Common Malware Behaviors
Threat actors Threat actors use viruses, worms, and Trojan horses to carry their payloads for other malicious…
0 Comments
Read More
September 6, 2024
September 6, 2024
0xLuk3
0xLuk3
Installing a Hacking OS in 4 steps
Cyber security is ever-changing, and choosing the best OS with the right toolkit is crucial…
0 Comments
Search
Archives
March 2025
February 2025
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
Meta
Log in
Tag Cloud