Homepage
Open in app
Sign inGet started

SecureBit

Securing every BIT

Understanding- Cyber Security Teams and Roles

Understanding- Cyber Security Teams and Roles

Want to get started in Cybersecurity but still confused about where to start? What role suits your interest and skill? What team to join in…
Go to the profile of goswamiijaya
goswamiijaya
Jun 9, 2021
Trending
Escalating Privileges through User Account Control (UAC)bypassing

Escalating Privileges through User Account Control (UAC)bypassing

This article explains: How to Bypass restrictions like User Account Control and escalate you Privileges, in a Windows 7 machine.
Go to the profile of goswamiijaya
goswamiijaya
Sep 2, 2020
Is there a Bug in our Calendar System?

Is there a Bug in our Calendar System?

“We are not down to a single, unique universe, but our findings imply a significant reduction of the multiverse, to a much smaller range…
Go to the profile of goswamiijaya
goswamiijaya
Sep 11, 2020
Meterpreter shell as a 32 & 64 Bit DLL

Meterpreter shell as a 32 & 64 Bit DLL

A post on- How to get a Meterpreter Shell as a 32 and 64 Bit DLL?
Go to the profile of goswamiijaya
goswamiijaya
Aug 25, 2020
Why a user-controlled pop-up is vulnerable?

Why a user-controlled pop-up is vulnerable?

Have you ever encountered the question, that why a simple pop-up^, that could be controlled by a user, makes an application vulnerable…
Go to the profile of goswamiijaya
goswamiijaya
Aug 26, 2020
Understanding Impersonation via Access Tokens

Understanding Impersonation via Access Tokens

A part of this article is dependent on the previous post- Escalating Privileges through User Account Control (UAC)bypassing.
Go to the profile of goswamiijaya
goswamiijaya
Sep 8, 2020
About SecureBitLatest StoriesArchiveAbout MediumTermsPrivacyTeams