PinnedOmar ElhadidiStudying Cryptography in Historical Order (Part 4 “Rotors fight”)Previously, I began a series exploring cryptography and classical ciphers from ancient times till the early 20th century, explaining them…Aug 4Aug 4
PinnedOmar ElhadidiStudying Cryptography in Historical Order (Part 2)in the previous blog, I started writing about cryptography in Ancient times(BC) and we discussed 2 of the most basic monoalphabetic ciphers…Jul 20Jul 20
PinnedOmar ElhadidiYour Guide To JWT Attacksthis is a detailed blog on JWT attacks with some source code ReviewMar 26, 2022Mar 26, 2022
PinnedOmar Elhadidi10 ways to get RCE From LFIthis illustrates multiple ways to upgrade your LFI to RCEFeb 25, 20221Feb 25, 20221
Omar ElhadidiStudying Cryptography in Historical Order (Part 3)Welcome to my third blog “Studying Cryptography in Historical Order”. If you didn't read parts one and two please go ahead, as I explain…Aug 4Aug 4
Omar ElhadidiTransposition CiphersWelcome to my new blog in my series where I explain Classical Ciphers. In this Blog, I will go through most of the well-known Transposition…Aug 4Aug 4
Omar ElhadidiMono-Alphabetic Substitution ciphersIn my first blog, where I talked about how and when the monoalphabetic substitution was invented and their historical appearance, I…Jul 24Jul 24
Omar ElhadidiStudying Cryptography in Historical Order (Part 1)Welcome to my new series where I’ll be writing blogs on Cryptography in historical order. We’ll explore the origins and evolution of…Jul 18Jul 18
Omar ElhadidiExplaining PKI like I am 5 until I am WARRIOR !!!IF you Struggle with understanding PKI, you found the right blog.Sep 30, 2023Sep 30, 2023