The Essential Guide to Radio Frequency Penetration Testing
Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, stands as a vital domain within ethical hacking. …
"In our modern world, countless applications rely on radio frequency elements" - an Interview with Larbi Ouiyzme
About the Author: Larbi OUIYZME Cybersecurity Consultant and Licensed Ham Radio Operator since 1988 with prefix CN8FF, deeply passionate about …
The Surge of Double Extortion Ransomware Attacks
The Surge of Double Extortion Ransomware Attacks Ransomware attacks have become an increasingly severe threat to organizations around the world. …
Setting Up a Radio Frequency Penetration Testing Lab: A Comprehensive Guide
Introduction The advent of wireless technologies, from mobile phones to Wi-Fi, satellite communications, and even automobiles, has established radio frequencies …

Good, Bad and the Ugly of HTTP/2
AuthorsPranali Phadtare, Soummya Kulkarni, Shruthi Shunmugom M About UsIBM PTC is a proficient internal Security Test Team responsible for vulnerability …
ChatGPT for Pentesters
AuthorsChaitanya S Rao, Arpitha S About UsIBM PTC is a proficient internal Security Test Team responsible for vulnerability assessment and …
API Security Common Mistakes
As per Rapid’s 4th annual State of APIs Report, 70% of developers indicate they will increase API usage this year, …
WiFi Deauthers vs Signal Jammers
The Theory behind WiFi Jamming in the RF Spectrum You might have seen several WiFi jamming devices on Chinese sites …
Android APIs Hacking
In the world of mobile app development, APIs play a crucial role in enabling developers to integrate various services into …
Zues7v2 - Cloud-Based Hash Cracker
Created: 05/12/2023 By Max Ahartz Prepared for: Curious Minds Everywhere *** Disclaimer *** This guide is for educational purposes only. …
Approach of Detecting Dependency Confusion Attacks using Artificial Intelligence and Machine Learning
Abstract The use of open-source is rapidly increasing for the software development process, which gives rise to the cyber attack …
SDR - Starting with Signal Hacking
Not all sensible data is exposed on the Internet through the IP transport layer. Some particular data are transmitted using …
WIPER Malware
Nayana MG ABSTRACT: Cyber war is an emerging digital threat which sets its root firmly without even giving a chance …
The Essential Guide to Radio Frequency Penetration Testing
Introduction Radio Frequency (RF) penetration testing, popularly referred to as RF pentesting, stands as a vital domain within ethical hacking. …
Methodology and tools used in API Testing Introduction
Introduction Performing pentests in APIs for many is a complex task, especially in some cases that do not have documentation …
Penetration Test Need-To-Know
What is a Penetration Test? A penetration test (also known as a pen test) is a simulated attack on an …
Could OpenAI's ChatGPT be a game-changer for United States intelligence agencies?
This revolutionary AI tool could help mission critical organizations develop and strengthen their cyber threat assessment and resiliency. Introduction The …
GREENBONE OPENVAS, THE OPEN SOURCE TOOL THAT CLOSES VULNERABILITIES
Vulnerability assessment is one of the most important components of risk management, with a lot of enterprise tools provided to …
The Role Of Blockchain Technology In Supply Chains Against Cyber Threats
Abstract: The use of blockchain technology in supply chains has the potential to significantly enhance the security and resilience of …
Setting Up a Radio Frequency Penetration Testing Lab: A Comprehensive Guide
Introduction The advent of wireless technologies, from mobile phones to Wi-Fi, satellite communications, and even automobiles, has established radio frequencies …
How to Integrate Artificial Intelligence on Audio Files into Offensive Security Workflows
INTRODUCTION Open source intelligence, commonly known as OSINT, refers to the process of collecting, processing and analyzing information from publicly …
Honeypot Technology: Comparisons, Types and Importance for Cyber Security
Honeypot technology holds significant importance in today's technology-driven world, serving as a crucial tool for safeguarding networks and monitoring evolving …
Unlocking the Power: Python for Windows API
If you are eager to explore the possibilities of interacting with the Windows API using Python, then you are in …
Navigating AWS Cloud Security: Insights from a Red Team Manager
Introduction Penetration testing is driven mainly by a deep passion for understanding the inner mechanisms of systems and overcoming built-in …
The Importance of Supply Chain Security
The Importance of Securing the Supply Chain in the Global Business Environment The paramount importance of robust supply chain security …
AI in Cybersecurity: A Systematic Review and Research Agenda
Objective: Pioneering AI's Role in Cybersecurity This study explores how artificial intelligence (AI) transforms the world of cybersecurity and computer …
Subdomain Takeover – Security Risk, Impact, Automated Detection and Remediation
Abstract In the olden days, static websites were hosted on a server and the domain name DNS record was pointed …
Android SSL Pinning Bypass technique
What is SSLPinning? Ensuring secure communication is imperative during the development of mobile apps. This concern is addressed through the …

Aerospace Cybersecurity: Satellite Hacking (W53)
This course is meant for anyone who wants to learn more about space-related cybersecurity specifically in relation to satellite systems. This course is meant for anyone of any skill level who is interested in expanding their skill set in satellite reconnaissance and vulnerability analysis.
AutoSec Pro: Vehicle Cybersecurity Mastery (W52)
AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.
Creating Advanced Ransomware with Golang (W51)
In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang
Mastering Splunk: A Comprehensive Guide (W50)
"Mastering Splunk: A Comprehensive Guide" is a comprehensive and hands-on course that covers all aspects of the Splunk platform, from the fundamentals to advanced topics. The course is designed to provide students with the knowledge and skills to effectively use Splunk to analyze and visualize data in their personal and professional lives.
