PinnedAkuto SaiWindows/Binary ~ Exploitation*Disclaimer: Some practical examples can be highly intrusive in nature and may violate legal and ethical guidelines. All of them were…Jun 11Jun 11
Akuto SaiQuantum Computing in Cyber-Security — Comprehensive Analysis ~ Part-1Quantum computing leverages the principles of quantum mechanics to perform computations using quantum bits (qubits), which can exist in…Mar 7Mar 7
Akuto SaiHP AndroTask To intercept TCP traffic and get a flag To intercept we use tcpdump and WiresharkAug 9, 2022Aug 9, 2022
Akuto SaiHackTheBox — Poly Write-upFirst I quickly analyzed on what was the platform was that binary based on with the help of “file”.Aug 9, 2022Aug 9, 2022
Akuto SaiSimple IoT ExperimentsPrepare a Communication Channel to communicatewith the Software based Hardware Sensors (Name of Application: IoTMQTTPanel) to the Broker…Aug 1, 2022Aug 1, 2022