!abdu11ahBehind the Mask: The Dark Art of Token ImpersonationIn this blog, I will give a step-by-step tutorial on how you can escalate your privileges on a machine using the Token Impersonation…Aug 27Aug 27
!abdu11ahKypo OpenStack Deployment GuideThis blog is all going to be about deploying Kypo OpenStack.Aug 20Aug 20
!abdu11ahBuild your own Cyber Range | Home Lab GuideA step-by-step guide for building your Home-Lab/Cyber-Range. So, without any further a do.Jun 22Jun 22
!abdu11ahCHC{CTS’24Hackathon}Writeups for all the OSINT challenges from the CTS Hackathon’24. So, without any further action.May 27May 27
!abdu11ahRoyal Elementor Addons Vulnerability: Stored Cross-Site Scripting (XSS)A Deep Dive into the Royal Elementor Addons Plugin Vulnerability and How to Protect Your WordPress Site.Apr 23Apr 23
!abdu11ahMy Guide To Attack And Defense CTFsAll the tips and tricks I know and use while playing Attack and Defence CTFs.Jan 19Jan 19
!abdu11ahCSC{CyberSleuthQuestCTF}Writeup for all the challenges that I solved at Cyber Sleuth Quest CTF’23Dec 22, 2023Dec 22, 2023