Author: 0xLuk3

0xLuk3 >>

Threat Hunting and Incident Response

    MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a comprehensive framework that…

Digital Signature Using SHA-256 with RSA Encryption.

Digital signatures are crucial in cryptography to ensure secure communication and data integrity. But how…

Cyberchef is a must-have security tool.

If you're seriously involved in cybersecurity or digital forensics, you've likely encountered a variety of…

SSRF with filter bypass via open redirection vulnerability

Server-side request Forgery allows an attacker to bypass network access control and make requests to…

SQL Injection

How to detect and exploit SQL Injection vulnerabilities. Structured Query Language (SQL) Injection, or SQLi,…

Hide secret data inside an image or audio file

Hey there! Suppose you have downloaded a .jpeg image from the World Wide Web and suspect…

Encoding and encryption

Encoding and encryption are used interchangeably. Encryption involves encoding data for confidentiality and security, while…

9 Common Malware Behaviors

Threat actors Threat actors use viruses, worms, and Trojan horses to carry their payloads for other malicious…

Installing a Hacking OS in 4 steps

Cyber security is ever-changing, and choosing the best OS with the right toolkit is crucial…

VMware Workstation 17 Pro For Free

Virtualization software, such as VMware, Virtualbox, or Parallels, is the answer if you want to…