Homepage
Open in app
Sign in
Get started
SecureBit
Securing every BIT
Follow
Understanding- Cyber Security Teams and Roles
Understanding- Cyber Security Teams and Roles
Want to get started in Cybersecurity but still confused about where to start? What role suits your interest and skill? What team to join in…
goswamiijaya
Jun 9, 2021
Trending
Escalating Privileges through User Account Control (UAC)bypassing
Escalating Privileges through User Account Control (UAC)bypassing
This article explains: How to Bypass restrictions like User Account Control and escalate you Privileges, in a Windows 7 machine.
goswamiijaya
Sep 2, 2020
Is there a Bug in our Calendar System?
Is there a Bug in our Calendar System?
“We are not down to a single, unique universe, but our findings imply a significant reduction of the multiverse, to a much smaller range…
goswamiijaya
Sep 11, 2020
Meterpreter shell as a 32 & 64 Bit DLL
Meterpreter shell as a 32 & 64 Bit DLL
A post on- How to get a Meterpreter Shell as a 32 and 64 Bit DLL?
goswamiijaya
Aug 25, 2020
Why a user-controlled pop-up is vulnerable?
Why a user-controlled pop-up is vulnerable?
Have you ever encountered the question, that why a simple pop-up^, that could be controlled by a user, makes an application vulnerable…
goswamiijaya
Aug 26, 2020
Understanding Impersonation via Access Tokens
Understanding Impersonation via Access Tokens
A part of this article is dependent on the previous post- Escalating Privileges through User Account Control (UAC)bypassing.
goswamiijaya
Sep 8, 2020
About SecureBit
Latest Stories
Archive
About Medium
Terms
Privacy
Teams