Setting Up a Radio Frequency Penetration Testing Lab: A Comprehensive Guide
Introduction The advent of wireless technologies, from mobile phones to Wi-Fi, satellite communications, and even automobiles, has established radio frequencies …
CYBER THREAT INTELLIGENCE: A LIGHT THAT SHINES IN THE DIGITAL UNDERWORLD
INTRODUCTION In today's technology-driven world, cybersecurity has emerged as a key priority. However, just securing systems and data is no …
API Penetration Testing: Tools, Techniques and Security Practices
Overview As we live in a digital era with rapid development of Application Programming Interfaces (API), safeguarding your application data …
Honeypot Technology: Comparisons, Types and Importance for Cyber Security
Honeypot technology holds significant importance in today's technology-driven world, serving as a crucial tool for safeguarding networks and monitoring evolving …

WiFi Hacking with Airgeddon on Kali Linux
Airgeddon is a popular, free, and open-source wireless security auditing tool that helps penetration testers locate and exploit vulnerabilities in …
WiFi Pentesting with Airodump-ng
by Juan Morales Free Internet! Well, not really……The purpose of this article is to demonstrate different forms of Wi-Fi network …
Top 6 CI/CD Security Best Practices to Follow
CI/CD falls under the category of DevOps, which is formed by amalgamating both practices of continuous integration and continuous delivery. …
Introduction to Internal Penetration Tests
by Dimitris Pallis Connectivity Basics Before jumping on to exploitation tools and techniques, the most important step is to connect …
Android Application Pentest
by Gabrielle Botbol About the author Gabrielle Botbol is a pentester, cyber security blogger, and podcaster CS by GB - …
Chatting with Rachael (ChatGPT) about Pentesting
by prof. Volker Skwarek, [email protected] In this interview, ChatGPT is challenged with the general subject of penetration testing. I wanted …
Good, Bad and the Ugly of HTTP/2
AuthorsPranali Phadtare, Soummya Kulkarni, Shruthi Shunmugom M About UsIBM PTC is a proficient internal Security Test Team responsible for vulnerability …
What is Scapy?
by Saad Babar Scapy is a powerful Python-based packet manipulation tool that allows you to dissect, send, and construct network …
ChatGPT for Pentesters
AuthorsChaitanya S Rao, Arpitha S About UsIBM PTC is a proficient internal Security Test Team responsible for vulnerability assessment and …
Is ChatGPT Useful for Penetration Testing?
An interesting question came up the other day: can a penetration tester use ChatGPT in a meaningful way to accomplish …
ESXi - VM exploited with Python
by Andrea Cavallini Exploit is the goal that an attacker has in order to compromise a system, a service or …
API Security Common Mistakes
As per Rapid’s 4th annual State of APIs Report, 70% of developers indicate they will increase API usage this year, …
Android APIs Hacking
In the world of mobile app development, APIs play a crucial role in enabling developers to integrate various services into …
The Role of Secure Access Service Edge in Cybersecurity
Abstract: SASE (Secure Access Service Edge) is a comprehensive solution that aims to improve the security of an organization's network …
WiFi Deauthers vs Signal Jammers
The Theory behind WiFi Jamming in the RF Spectrum You might have seen several WiFi jamming devices on Chinese sites …
SDR - Starting with Signal Hacking
Not all sensible data is exposed on the Internet through the IP transport layer. Some particular data are transmitted using …
Building Intuition into Monitoring for OT/ICS Security
by Danielle Jablanski The current state of operational technology and industrial control systems cybersecurity is turning a corner. It has …
WIPER Malware
Nayana MG ABSTRACT: Cyber war is an emerging digital threat which sets its root firmly without even giving a chance …
ETW vs Sysmon Against C2 Servers
by Damon Mohammedbeger In this article, I want to talk about my research about ETW and Sysmon and how I …
Zues7v2 - Cloud-Based Hash Cracker
Created: 05/12/2023 By Max Ahartz Prepared for: Curious Minds Everywhere *** Disclaimer *** This guide is for educational purposes only. …
Setting Up a Radio Frequency Penetration Testing Lab: A Comprehensive Guide
Introduction The advent of wireless technologies, from mobile phones to Wi-Fi, satellite communications, and even automobiles, has established radio frequencies …
CYBER THREAT INTELLIGENCE: A LIGHT THAT SHINES IN THE DIGITAL UNDERWORLD
INTRODUCTION In today's technology-driven world, cybersecurity has emerged as a key priority. However, just securing systems and data is no …
API Penetration Testing: Tools, Techniques and Security Practices
Overview As we live in a digital era with rapid development of Application Programming Interfaces (API), safeguarding your application data …
Honeypot Technology: Comparisons, Types and Importance for Cyber Security
Honeypot technology holds significant importance in today's technology-driven world, serving as a crucial tool for safeguarding networks and monitoring evolving …

Aerospace Cybersecurity: Satellite Hacking (W53)
This course is meant for anyone who wants to learn more about space-related cybersecurity specifically in relation to satellite systems. This course is meant for anyone of any skill level who is interested in expanding their skill set in satellite reconnaissance and vulnerability analysis.
AutoSec Pro: Vehicle Cybersecurity Mastery (W52)
AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.
Creating Advanced Ransomware with Golang (W51)
In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang
Mastering Splunk: A Comprehensive Guide (W50)
"Mastering Splunk: A Comprehensive Guide" is a comprehensive and hands-on course that covers all aspects of the Splunk platform, from the fundamentals to advanced topics. The course is designed to provide students with the knowledge and skills to effectively use Splunk to analyze and visualize data in their personal and professional lives.
