PinnedElNiakinInfoSec Write-upsUltimate Guide to Setting Up Your Flipper Zero: A Hacker’s Swiss Army KnifeUnlock the full potential of your Flipper Zero with this step-by-step tutorial. Whether you’re exploring its hacking capabilities, everyday…Mar 18Mar 18
PinnedElNiakinInfoSec Write-upsPenTestGPT: The Future of Automated Penetration Testing ?Discover how PenTestGPT revolutionizes cybersecurity through automated penetration testing, leveraging ChatGPT’s power for enhanced…Feb 123Feb 123
PinnedElNiakinInfoSec Write-upsMastering the eJPTv Certification: Strategies, Insights, and AI AssistanceDiscover effective strategies, personal insights, and how AI can simplify your journey to passing the eJPTv certification. Whether you’re a…Feb 171Feb 171
PinnedElNiakinInfoSec Write-upsUnlocking Malware Mysteries: The Power of SEMAIn a digital landscape besieged by ever-evolving cyber threats, the proliferation of malware poses a formidable challenge. With thousands…Jan 24Jan 24
PinnedElNiakinInfoSec Write-upsRevolutionizing Network Protocol Testing: A New Era of Validation“Towards verification of QUIC and its extensions”Jan 26Jan 26
ElNiakUnderstanding Prompt Engineering: A Comprehensive 2024 SurveyExplore the latest advancements in prompt engineering techniques for large language models. Learn how various approaches like zero-shot…2d ago2d ago
ElNiakinInfoSec Write-upsRegreSSHion (CVE-2024–6387): Dive into the Latest OpenSSH Server ThreatExplore CVE-2024–6387, a critical cybersecurity vulnerability. Learn its impact, how to detect it, and the best practices to safeguard your…3d ago3d ago
ElNiakinInfoSec Write-upsBountyDork: Your Ultimate Automatic Dorking Testing Companion For Bug BountyDiscover BountyDork, a powerful tool designed for penetration testers and cybersecurity researchers, offering automation, reporting, and…4d ago4d ago
ElNiakinInfoSec Write-upsEnabling Reproducible and Verification of Time to Network Protocol TestingDiscover the “Network Simulator-centric Compositional Testing” (NSCT) methodology, a groundbreaking approach destined to transform network…Jun 18Jun 18
ElNiakinInfoSec Write-upsBYOVD Attacks: The Hidden Threats of Vulnerable DriversDiscover the insidious world of BYOVD (Bring Your Own Vulnerable Driver) attacks, where cybercriminals exploit legitimate drivers to…Jun 5Jun 5