PinnedHardik JaininInfoSec Write-upsThreat Actors Naming ConventionsHow are Threat Actors Named?Jul 61Jul 61
PinnedHardik JaininInfoSec Write-upsStart Threat Hunting with YARA RulesA beginner-friendly guide to the most advanced pattern-matching toolMay 51May 51
PinnedHardik JaininInfoSec Write-upsSome common Steganography tools for CTFsHi, I am Hardik Jain, a cyber security researcher, and a student.Apr 12, 2023Apr 12, 2023
Hardik JaininInfoSec Write-upsWebsite and IP Enumeration Tools ListTo gather information regarding any website or an IP, you need to use a bunch of tools that are readily available on the internet.Dec 23, 2023Dec 23, 2023
Hardik JaininInfoSec Write-upsDriftingBlues: 2 Vulnhub Write-up | WalkthroughHere is the walkthrough of Drifting Blues 2 Vulnhub Machines. I am sure you will get to learn a thing or two from this.Sep 5, 2023Sep 5, 2023
Hardik JaininInfoSec Write-upsDriftingBlues: 1 Vulnhub Write-up | WalkthroughIn this write-up, I am gonna give you a walkthrough of DriftingBlues: 1 machine from Vulnhub.Jul 25, 20231Jul 25, 20231
Hardik JaininInfoSec Write-upsMemory Dump Analysis by using Volatility FrameworkVolatility is an open-source memory forensics framework for incident response and malware analysis.Jul 15, 2023Jul 15, 2023