In this article, we’ll explore the pervasive presence and potential risks associated with QR codes in daily life. We’ll discuss the ease with which malicious QR codes can be created, either manually or through specialized tools, allowing attackers to embed harmful payloads. A tutorial its included, emphasizing its role in creating various types of malicious QR codes for security testing purposes.
Red Team Tactics to uncover hidden Secrets on Websites
In this article, we’ll demonstrate red team tactics for uncovering hidden secrets on websites. Despite security layers that companies deploy, such as Cloudflare WAF and next-generation firewalls, attackers can exploit sensitive information embedded in code, such as API keys and tokens.
Write up: How to schedule tasks the right way in Linux, using crontab
Premium Content Subscribe to Patreon to watch this episode. Watch a crontab related episode below: Reading Time: 6 Minutes Introduction Cron is named after the Greek word "Chronos" which translates to "time"....
A Hacker’s Guide to Subdomain Enumeration
Enumeration is key when it comes to hacking; enumerating subdomains leads to discovering many untouched surfaces with vulnerabilities. By understanding how to uncover more hidden subdomains a target has, you can significantly increase coverage, especially when performing Bug Bounty Hunting or Pentesting.
Steganography: How to hide data in images and extract them
Steganography is a hiding technique, which aims at delivering a hidden message where some other kind of information is already being delivered…
Write up: Detect malicious hacker activities on endpoints
Introduction Welcome to the 21st century, where almost everything in life is connected to an electronic device. At one time, the term digital forensics was a synonym for computer forensics, but now involves all devices capable of storing digital...






