Skip to content
OPSEC
Menu
Blog
About me
Contact
Certifications
[CTF]
Author:
Lucian
OPSEC
>>
Read More
February 5, 2025
February 5, 2025
Lucian
Lucian
Cyberchef is a must-have security tool.
If you're seriously involved in cybersecurity or digital forensics, you've likely encountered a variety of…
0 Comments
Read More
November 7, 2024
November 7, 2024
Lucian
Lucian
SSRF with filter bypass via open redirection vulnerability
Server-side request Forgery allows an attacker to bypass network access control and make requests to…
0 Comments
Read More
October 20, 2024
October 20, 2024
Lucian
Lucian
SQL Injection
How to detect and exploit SQL Injection vulnerabilities. Structured Query Language (SQL) Injection, or SQLi,…
0 Comments
Read More
September 27, 2024
September 27, 2024
Lucian
Lucian
Hide secret data inside an image or audio file
Hey there! Suppose you have downloaded a .jpeg image from the World Wide Web and suspect…
0 Comments
Read More
September 25, 2024
September 25, 2024
Lucian
Lucian
Encoding and encryption
Encoding and encryption are used interchangeably. Encryption involves encoding data for confidentiality and security, while…
0 Comments
Read More
September 12, 2024
September 12, 2024
Lucian
Lucian
9 Common Malware Behaviors
Threat actors Threat actors use viruses, worms, and Trojan horses to carry their payloads for other malicious…
0 Comments
Read More
September 6, 2024
September 6, 2024
Lucian
Lucian
Installing a Hacking OS in 4 steps
Cyber security is ever-changing, and choosing the best OS with the right toolkit is crucial…
0 Comments
Read More
August 21, 2024
August 21, 2024
Lucian
Lucian
VMware Workstation 17 Pro For Free
Virtualization software, such as VMware, Virtualbox, or Parallels, is the answer if you want to…
0 Comments
Read More
July 12, 2024
July 12, 2024
Lucian
Lucian
What is the Cyber Kill Chain?
What is the Cyber Kill Chain in cyber security? Investing in cybersecurity analysis and strategy…
0 Comments
Read More
June 20, 2024
June 20, 2024
Lucian
Lucian
The threat of Malware in Cybersecurity
The threat of Malware in Cybersecurity: Understanding the Risks This study aims to review and…
0 Comments
Posts pagination
1
2
3
Next page
Search
Archives
February 2025
November 2024
October 2024
September 2024
August 2024
July 2024
June 2024
Meta
Log in
Tag Cloud
Ai
Backup
Black hat
Computer backup
cyber
Cyber Kill Chain
defense
Ecoding
encryption
engine
Google
Grey hat
IDOR
image
information
Malware
Mitigate
model
Objectives of Cyber Threat Intelligence
pentesting
ransomware
Research
search
secret
security
SEO
THM
tool
topics
Trojan
viruses
vmware
Vulnerability
web
workstation
worms