Leveraging AI in Reverse Engineering: Techniques, Challenges, and Future Trends
Reverse engineering is the process of deconstructing a product or system to understand its design, architecture,and functionality. This technique is …
AI and Reverse Engineering: Redefining Cybersecurity in a Digital Age
Reverse engineering has long been a cornerstone of cybersecurity, enabling professionals to deconstruct software, firmware,and hardware to uncover their internal …
Meet Hugo Le Belzic: Pro Behind Pixel Trickery Outsmarting AI in Image Classification Models
Recently, I was exploring GitHub for AI-related repositories and came across a fascinating profile from HugoLB0. Curious, I decided to …
Aerial Assault: Combining Drones and Pentesting (W54)
Discover how to use drones for penetration testing with this innovative course. Gain skills in offensive and defensive drone operations, understand technical foundations, and learn about ethical and legal considerations. Perfect for cybersecurity professionals seeking to stay ahead in the field.
Enhancing Malware Detection with AI-Assisted Reverse Engineering
Abstract The cybersecurity industry faces a critical challenge due to the rapid evolution of malware, necessitating the development of sophisticated …
Ettercap and middle-attacks tutorial
We have published new article about Ettercap. You can find it here: https://pentestmag.com/article-fun-ettercap/ In the computer world, an attack is a …
Aerospace Cybersecurity: Satellite Hacking (W53)
Dive into the essentials of satellite cybersecurity with this comprehensive course. Learn satellite reconnaissance, communication analysis, decoding techniques, and vulnerability assessments. Ideal for all skill levels, this course provides practical experience and theoretical knowledge, preparing you to protect satellite systems from cyber threats.
Hacking a Locked Windows 10 Computer With Kali Linux
Hacking a Locked Windows 10 Computer With Kali Linux by Graham Zemel, blog.grahamzemel.com TL;DR- A neat trick I learned to …
Metasploit Cheat Sheet
Metasploit Cheat Sheet by Tim Keary Widely reputed as the most used penetration testing framework, Metasploit helps security teams identify …
TOP 5 Latest Cyber Security Books (2017-2019) | Best & Latest Must-Reads For Any Aspiring or Seasoned Hacker
TOP 5 Latest Cyber Security Books (2017-2019) | Best & Latest Must-Reads For Any Aspiring or Seasoned Hacker by …
Julia: a Language for the Future of Cybersecurity
Julia: a Language for the Future of Cybersecurity by Shen Huang Julia 1.0 was released in 2018. It is a …
Formula Injection
Are you on the watch for malware within spreadsheet exports of your banking transactions? Or how about within a .CSV …
Exploiting blind SQL injections in 'UPDATE' and 'INSERT' statements without stacked queries by Sina Yazdanmehr
Overview The SQL injection attack was introduced around 1998 for the first time. This high-level risk vulnerability can be found …
How I Hacked Into Your Corporate Network Using Your Own Antivirus Agent
How I Hacked Into Your Corporate Network Using Your Own Antivirus Agent by Angelo Ruwantha Recently I was busy with …
Antivirus Evasion with Python
Antivirus Evasion with Python by Marcelo Sacchetin Summary When deploying defense in depth security controls for your organization, you are …
IoT Security: How to Search for Vulnerable Connected Devices
IoT Security: How to Search for Vulnerable Connected Devices by Dominique René When you read news about recently discovered vulnerabilities …
How to prepare and use Docker for web pentest by Júnior Carreiro
Introduction Docker is the world's leading software containerization platform. Using Docker we can create different environments for each Pentest type. …
The Hard Life Of Exploit Developers
The Hard Life Of Exploit Developers by Florian Bogner Preface: Although this blog post is a companion post to a talk …
Red Teaming @ 10000 Feet
Red Teaming @ 10000 Feet by David Evenden There are many articles/books that are pro-Red Teaming, but I haven't seen …
Pentest: Scapy Cheat Sheet by SANS Institute
Scapy Cheat Sheet Pocket Reference Guide Ver. 0.2 by SANS Institute The content has been originally published at: https://pen-testing.sans.org/blog/2016/04/05/scapy-cheat-sheet-from-sans-sec560/?reply-to-comment=8562
Using the MITRE ATT&CK Navigator for Intelligence Gathering Pre-purple Teaming
Using the MITRE ATT&CK navigator for intelligence gathering pre-purple teaming by Eliza May Austin Purple teaming should always be intelligence-lead …
WiFi Scanning Tools on Ubuntu 14.04
Dear PenTest Readers, Today we've got for you new article about WiFi Scanning Tools on Ubuntu 14.04 written by Majdi Chaouachi. …
Leveraging AI in Reverse Engineering: Techniques, Challenges, and Future Trends
Reverse engineering is the process of deconstructing a product or system to understand its design, architecture,and functionality. This technique is …
Meet Hugo Le Belzic: Pro Behind Pixel Trickery Outsmarting AI in Image Classification Models
Recently, I was exploring GitHub for AI-related repositories and came across a fascinating profile from HugoLB0. Curious, I decided to …
Enhancing Malware Detection with AI-Assisted Reverse Engineering
Abstract The cybersecurity industry faces a critical challenge due to the rapid evolution of malware, necessitating the development of sophisticated …
Aerial Assault: Exploring the Intersection of Drones and Cybersecurity
In today's rapidly evolving digital landscape, the fusion of drone technology and cybersecurity is setting the stage for revolutionary advancements. …
Aerial Assault: Combining Drones and Pentesting (W54)
Discover how to use drones for penetration testing with this innovative course. Gain skills in offensive and defensive drone operations, understand technical foundations, and learn about ethical and legal considerations. Perfect for cybersecurity professionals seeking to stay ahead in the field.
Aerospace Cybersecurity: Satellite Hacking (W53)
Dive into the essentials of satellite cybersecurity with this comprehensive course. Learn satellite reconnaissance, communication analysis, decoding techniques, and vulnerability assessments. Ideal for all skill levels, this course provides practical experience and theoretical knowledge, preparing you to protect satellite systems from cyber threats.
AutoSec Pro: Vehicle Cybersecurity Mastery (W52)
AutoSec Pro is an immersive course diving into the world of automotive cybersecurity, providing an in-depth understanding of modern vehicle systems and their vulnerabilities. This cutting-edge course leverages a hands-on approach to exploit and mitigate potential threats while seamlessly integrating the ISO 21434 standard. Harness the power of innovation and technology as you spearhead the effort to safeguard the future of smart transportation.
Creating Advanced Ransomware with Golang (W51)
In this course, you will develop a hybrid ransomware using, that is, with two encryptions RSA and AES with a programming language that is gaining a lot of strength - Golang