PinnedAnkitsinhaAdvanced Penetration TestingPenetration testing is a crucial aspect of cybersecurity, enabling organizations to identify and address vulnerabilities in their systems…Apr 7Apr 7
PinnedAnkitsinhaExecution and Initial Access Via LolBins And LNKThis article aims to demonstrate Evasion and execution via LOLBins (Living Off the Land Binaries) and LNK files that represent…Mar 14Mar 14
AnkitsinhaPASSWORD CAPTURE VIA PHISHINGNot all websites are compromised directly, compromising such sites require special technique. Today we are going to compromise victim’s…Apr 24Apr 24
AnkitsinhaExploit Development Basics: Simple Buffer OverflowWhile data is being moved from one place to another, buffers — regions of memory storage — reserve it momentarily. Data volumes greater…Apr 18Apr 18
AnkitsinhaA Deep Dive into EDR Bypass StrategiesIn the ever-evolving landscape of cybersecurity, Endpoint Detection and Response (EDR) solutions serve as critical defenses against…Mar 26Mar 26
AnkitsinhaDeciphering the Veil: Analyzing Obfuscated PowerShell ScriptsIn the realm of cybersecurity, one of the most prevalent threats comes in the form of obfuscated PowerShell scripts. These seemingly…Mar 26Mar 26
AnkitsinhaOpen Source IntelligenceOpen Source Intelligence (OSINT) refers to the activity of finding information containing in the public domain (e.g… google, GitHub…Jul 12, 2023Jul 12, 2023
AnkitsinhaThreat Hunting: Creating IOC And Malware IdentificationThe purpose of this article is to highlight the value of generating indicators of compromise (IOC) and using them toJul 11, 2023Jul 11, 2023