Vishal RajinSystem WeaknessActive Directory Secrets: Mastering Group Policy Objects (GPO) - Part 1Unlocking the Power of Active Directory: An In-Depth Guide to Group Policy Objects (Part 1)Jun 29Jun 29
Vishal RajinSystem WeaknessActive Directory Secrets: Managing Active Directory Objects using PowerShell“Mastering Active Directory: Essential Tips for Efficient User and Device Management”Jun 22Jun 22
Vishal RajinSystem WeaknessActive Directory Secrets: The Essential Guide to FSMO Roles and TransfersIntroduction to FSMO RolesJun 18Jun 18
Vishal RajinSystem WeaknessRed Teaming on Azure: How to Secure Your Cobalt Strike Teamserver Using RedirectorsLearn how to set up and configure a teamserver and redirector server to protect your red team operations from exposure.Jun 15Jun 15
Vishal RajinSystem WeaknessInto the Dark World of Lockbit 3.0: A Practical Showcase of RAAS and PDF Trojan TechniqueUnveiling the Dark World: Inside Lockbit 3.0 Ransomware — From Creation to Prevention, a Comprehensive Guide.May 12May 12
Vishal RajinSystem WeaknessCrack the Code: A Hacker’s Guide to Hack Home Wi-Fi NetworkHacking Home Wi-Fi: Protecting Networks from Cyber ThreatsMay 1May 1
Vishal RajinSystem WeaknessCracking the Code: Advanced CSRF Token Validation and Brute-force attack with BurpSuite’s IntruderUnveiling Advanced Techniques for Web Application Security with BurpSuite and CSRF Token ValidationApr 10Apr 10
Vishal RajinSystem WeaknessBreaking Down the Threat: Exploring the Latest Office 365 Phishing Method with OAuth Device CodeNew Phishing technique for compromising Office 365 accountJan 111Jan 111
Vishal RajinSystem WeaknessUnleashing Chaos: Manually Embedding a Malicious Payload into an APK File — A Closer Look into…Introduction:May 23, 20231May 23, 20231
Vishal RajinSystem WeaknessWeaponizing Documents with LuckyStrike: A Malicious ApproachUnderstanding Document Weaponization for Cybersecurity Professionals.May 7, 20231May 7, 20231