PinnedALBERTSTATIC MALWARE ANALYSIS OF ZEUS BANKING TROJAN REPORTMy inspiration, #Grant Collins, has always supported my cybersecurity journey. Learning from his videos, I have tried analyzing malware at…May 27May 27
ALBERTLA COUNTY HEALTH SERVICES: PATIENT’S DATA EXPOSED IN PHISHING ATTACK“This is a small case study for my academic project. A few hypothetical assumptions in this case-study comments are accepted on hypothesis…May 25May 25
ALBERTNOT-EE-PAD (A good example of TYPO-SQUATTING. )I started learning Wireshark and practicing with malware packet files for enumeration. It’s been quite fun diving into this world! I…Apr 41Apr 41
ALBERTIS FAKE STRONG?Disclaimer: This tutorial is for educational purposes only and should not be used for unethical activities.Mar 21Mar 21
ALBERTIs Vision Pro Vulnerable?Unlocking the Potential, Assessing the Risks: Delving into the Vulnerabilities of Vision ProVision Technology.Feb 25Feb 25
ALBERTPAYLOAD ANALYSIS IN FLAREVMIn addition to my payload analysis in Flare VM, I also enjoy working with different Linux-based VMs, particularly for GNS projects…Dec 31, 2023Dec 31, 2023