PinnedAlimuhammadsecuredinThe Deep HubMaking counterfeit US bills Part 2This article underlines how counterfeit money is manufactured, emphasizing its impact on economies worldwide, including detailed examples…Jul 15Jul 15
PinnedAlimuhammadsecuredinThe Deep HubHow it’s Made: Counterfeit MoneyRead part 2 here: Click Me!Jul 111Jul 111
PinnedAlimuhammadsecuredinThe Deep HubHow students are compromising their school’s internal networks.This is information I’ve learned throughout the years of my time in public education going far as back as elementary school!Jun 173Jun 173
PinnedAlimuhammadsecuredinThe Deep HubHow 12-year-olds hack thousands of accounts a dayDuring the COVID-19 era many teens were locked inside of their homes and addicted to video games started downloading cheats and buying…Jun 143Jun 143
PinnedAlimuhammadsecuredinThe Deep HubHow I hacked a marriage database: tale of IDORA Tale of IDOR, PII Disclosure, and Recon TipsJun 143Jun 143
AlimuhammadsecuredOverwriting Variables Using C’s printf Vulnerability to Hijack ConditionsThis abuses C’s printf functions in programs to over-write variables to values of our choosing. This type of exploitation is known as…21h ago21h ago
AlimuhammadsecuredinThe Deep HubLeaking Stack Memory Using C’s Printf formatterspicoCTF practice I wanted to write a writeup on (for myself mainly) of my thought process and rabbit holes of leaking the flag using NOT…3d ago3d ago
AlimuhammadsecuredinThe Deep HubOSINT — using Whatsmyname.app2024 N00bz CTF Pastebin Writeup5d ago5d ago
AlimuhammadsecuredinThe Deep HubArbitrary Python Code Execution hijacking local base64 module2024 N00bz CTF WaaS Writeup5d ago5d ago
AlimuhammadsecuredinThe Deep HubDownloading website’s files with an LFI Bypass using symlinks2024 N00bzCTF File Sharing Portal Writeup5d ago5d ago