Abdul Majid JamilAnydesk Forensic and Log AnalysisIn this article we are going to analyze the traces or evidence left by the Anydesk application both in its version for Android and in its…Aug 31, 2023Aug 31, 2023
Abdul Majid JamilExtract IPA from iPhonehow to fetch/extract IPA file from iPhone. Like in android mobile/emulator, it is very easy and more of a drag and drop to extract APK. But…Jul 24, 2023Jul 24, 2023
Abdul Majid JamilA Step-by-Step Guide Jailbreaking iOS 15 to 16jailbreak your iPhone running on iOS 15 or 16, you’ve come to the right place. In this guide, we’ll walk you through the process…Jul 24, 2023Jul 24, 2023
Abdul Majid JamilAll in One! OSI Layers & CybersecurityI created a one pager. I brought together the network OSI Layers and Cybersecurity.Jul 12, 2023Jul 12, 2023
Abdul Majid JamilUnleashing The Power Of SQL Injection PortSwigger Web SecurityPortSwigger Web SecurityIntroductionJul 6, 2023Jul 6, 2023
Abdul Majid JamilFile Upload Attack Cheat SheetIt is often used for gaining access to the target shell using Reverse Shell, or getting sensitive information using Remote Code Execution…Jul 6, 2023Jul 6, 2023
Abdul Majid JamilSSTImap Code Injection and Server-Side🛠 SSTImap🔥 🤯 is a penetration testing software that can check websites for Code 💉 Injection and Server-Side 🤯Template Injection…Jul 6, 2023Jul 6, 2023
Abdul Majid JamilDark Web & Anonymity Home-LabHow to “Access the Dark Web Safely”, tools to stay “Anonymous, Dark Web Monitoring for Blue Team Operations” and much more.Mar 1, 2023Mar 1, 2023
Abdul Majid JamilBasic Linux Privilege EscalationBefore starting, I would like to point out — I’m no expert. As far as I know, there isn’t a “magic” answer, in this huge area. This is…Jan 4, 2023Jan 4, 2023