PinnedOmar ElhadidiStudying Cryptography in Historical Order (Part 2)in the previous blog, I started writing about cryptography in Ancient times(BC) and we discussed 2 of the most basic monoalphabetic ciphers…6d ago6d ago
PinnedOmar ElhadidiYour Guide To JWT Attacksthis is a detailed blog on JWT attacks with some source code ReviewMar 26, 2022Mar 26, 2022
PinnedOmar Elhadidi10 ways to get RCE From LFIthis illustrates multiple ways to upgrade your LFI to RCEFeb 25, 2022Feb 25, 2022
Omar ElhadidiMono-Alphabetic Substitution ciphersIn my first blog, where I talked about how and when the monoalphabetic substitution was invented and their historical appearance, I…2d ago2d ago
Omar ElhadidiStudying Cryptography in Historical Order (Part 1)Welcome to my new series where I’ll be writing blogs on Cryptography in historical order. We’ll explore the origins and evolution of…Jul 18Jul 18
Omar ElhadidiExplaining PKI like I am 5 until I am WARRIOR !!!IF you Struggle with understanding PKI, you found the right blog.Sep 30, 2023Sep 30, 2023