PinnedAlimuhammadsecuredinThe Deep HubMaking counterfeit US bills Part 2This article underlines how counterfeit money is manufactured, emphasizing its impact on economies worldwide, including detailed examples…Jul 15Jul 15
PinnedAlimuhammadsecuredinThe Deep HubHow it’s Made: Counterfeit MoneyRead part 2 here: Click Me!Jul 111Jul 111
PinnedAlimuhammadsecuredinThe Deep HubHow students are compromising their school’s internal networks.This is information I’ve learned throughout the years of my time in public education going far as back as elementary school!Jun 173Jun 173
PinnedAlimuhammadsecuredinThe Deep HubHow 12-year-olds hack thousands of accounts a dayDuring the COVID-19 era many teens were locked inside of their homes and addicted to video games started downloading cheats and buying…Jun 143Jun 143
PinnedAlimuhammadsecuredinThe Deep HubHow I hacked a marriage database: tale of IDORA Tale of IDOR, PII Disclosure, and Recon TipsJun 143Jun 143
AlimuhammadsecuredN00bzCTF File Sharing Portal WriteupWriteup of how the file sharing portal that only allows .TAR files was abused to LFI via SYMLINKS and using /proc to leverage the flag’s…13h ago13h ago
AlimuhammadsecuredHow students are compromising their school’s internal networks. Part 2This article explores the vulnerabilities in school networks, focusing on how students compromise them. We discuss Active Directory…Jul 16Jul 16