MrNmap5G COVERAGE BY DRONES AND CHALLENGES5G networks are being deployed in many countries around the world, and the deployment and coverage of 5G static nodes are typically…Feb 23, 2023Feb 23, 2023
MrNmap“The Dawn of 5G: Exploring the Technology, Benefits, and Challenges”Q1. What are some of the enterprise i.e. B2B customers that would be interested in 5GFeb 19, 2023Feb 19, 2023
MrNmapJourney to OSCP 2020 {PWK}This post will highlight my journey, approach and experience towards OSCP pwk V2 2020. i will include my experience, reference, links…Nov 15, 20201Nov 15, 20201
MrNmapBuffer Overflow from 0 to RootThis post is about simple buffer overflow and basic exploitation methodJul 15, 2020Jul 15, 2020
MrNmapCode Execution Via XSS in power shellRecently i found code execution via txt file in microsoft windows all version. you can execute any code on remote system via abusing…Mar 22, 2020Mar 22, 2020
MrNmapGrandpa w/o MetasploitIn this walkthrough, I will be showing how to root the machine without using the metasploit method and importent concept which can use in…Jan 25, 2020Jan 25, 2020
MrNmap[Windows Privelege Escalation via Token Kidnapping]Uploading binary into box via sqlninga appsJan 21, 2020Jan 21, 2020
MrNmapHack The Box -Granny 10.10.10.15 w/o metasploitIn this walkthough, I will be showing how to root Granny the machine without using the metasploit method.Write up about all HTB box will…Jan 10, 20201Jan 10, 20201
MrNmapHTB optimum WriteupThis is very shot writeup fro optimum kindly execute all steps in detailsDec 30, 2019Dec 30, 2019