PinnedAli AKinInfoSec Write-upsMalware Hunting 101: A Beginner’s Guide to Analysis and Reverse EngineeringHello Friend :)5 min read·Jun 30, 2023----
PinnedAli AKinInfoSec Write-upsPrivileges Escalation Techniques (Basic to Advanced) for WindowsPart-49 min read·Aug 29, 2023--1--1
PinnedAli AKinInfoSec Write-upsPersistence || Backdoor Techniques (Beginner to Advanced) in LinuxPart-15 min read·Jan 4, 2023----
PinnedAli AKinInfoSec Write-upsThe Art of Tracking a Hacker || Data BreachesIn the world of cybersecurity, it’s pretty common when companies or individuals get affected because of cyber attacks or Data Breaches.4 min read·Jan 30, 2023----
PinnedAli AKinInfoSec Write-upsPrivileges Escalation Techniques (Basic to Advanced) in LinuxPart-26 min read·Oct 29, 2022----
Ali AKinInfoSec Write-upsBlue Team Bootcamp Series (P3): How to Detect Cross-Site Scripting (XSS) AttacksHello Friend :)4 min read·Dec 27, 2023----
Ali AKinInfoSec Write-upsBlue Team Bootcamp Series (P2): How to Detect SQL Injection AttacksHello Friend :)5 min read·Dec 2, 2023--1--1
Ali AKinInfoSec Write-upsBlue Team Bootcamp Series (P1): How to Detect Brute Force AttacksIn this series — Blue Team Bootcamp, we’re going to learn about tactics, techniques and methodology that Blue Teamers in Cybersecurity…7 min read·Nov 22, 2023----
Ali AKinInfoSec Write-upsUnderstanding the Critical CVE-2023–22515 in Confluence ServerAtlassian Confluence Server and Confluence Data Center5 min read·Oct 19, 2023----
Ali AKinInfoSec Write-upsCommand & Control Mastery with Covenant C2Hello Friend. Today we’re going to talk about C2 Specifically Covenant C2.11 min read·Oct 4, 2023----