PinnedMaruf Farhan RiganinSystem WeaknessDumping Hashes with Mimikatz:Mimikatz is a well-liked post-exploitation tool that hackers use to steal crucial authentication credentials stored in memory, particularly…Nov 12, 2023Nov 12, 2023
Maruf Farhan RiganEnhancing E-Voting Systems with Blockchain TechnologyThe integrity and security of electoral processes are fundamental to the functioning of democracies worldwide. Traditional voting systems…May 21May 21
Maruf Farhan RiganBlockchain To detect Fake ProductsIn today’s global market, counterfeit products pose a significant threat to both consumers and legitimate businesses. From luxury goods to…May 21May 21
Maruf Farhan RiganCracking LiPrivilege Escalation: A Guide to Kernel ExploitationThe kernel is the core component of an operating system that manages system resources, facilitates communication between hardware and…Apr 27Apr 27
Maruf Farhan RiganHarvesting Passwords from Usual Spots on Windows SystemWindows privilege escalation refers to techniques attackers use to gain more control over a computer system than their initial access…Apr 23Apr 23
Maruf Farhan RiganHow To Enumerate Network Information in LinuxEnumerating network information on Linux is the process of manually gathering details about your system’s connection to the network. This…Mar 26Mar 26
Maruf Farhan RiganUltimate Guide to Linux User Enumeration (For Beginners & Pros!)Why it Matters:Mar 25Mar 25
Maruf Farhan RiganThe Art of Linux Local Enumeration: A Hands-on ExplorationIn the world of cybersecurity, understanding a system’s details is crucial. Local enumeration on Linux is the process of gathering…Mar 25Mar 25
Maruf Farhan RiganHow to Automate Windows Local EnumerationManually gathering information about a Windows system can be tedious. Automating local enumeration streamlines the process, saving you time…Mar 25Mar 25
Maruf Farhan RiganHow Hackers Trick You: Understanding Social Engineering with SETSocial-Engineer Toolkit (SET)Mar 20Mar 20