Posts by Tag

antivirus

Back to Top ↑

red team

Back to Top ↑

spear phishing

Back to Top ↑

malware

Back to Top ↑

implant

Back to Top ↑

recon

Back to Top ↑

email

Back to Top ↑

ransomware

The Three Types of Ransomware

6 minute read

Ransomware encrypts data and demands ransom money for the decryption key. The ransomware threat is growing, and it is increasingly targeting businesses. Whil...

Back to Top ↑

petya

The Three Types of Ransomware

6 minute read

Ransomware encrypts data and demands ransom money for the decryption key. The ransomware threat is growing, and it is increasingly targeting businesses. Whil...

Back to Top ↑

open redirect

Google Open Redirect

1 minute read

Edit: Google fixed this by introducing a redirect warning page that requires the user to click the redirected link.

Back to Top ↑

phishing

Google Open Redirect

1 minute read

Edit: Google fixed this by introducing a redirect warning page that requires the user to click the redirected link.

Back to Top ↑

google

Google Open Redirect

1 minute read

Edit: Google fixed this by introducing a redirect warning page that requires the user to click the redirected link.

Back to Top ↑

pupy

Back to Top ↑

python

Back to Top ↑

powershell

Back to Top ↑

blue team

Back to Top ↑

meterpreter

Back to Top ↑

post exploitation

Back to Top ↑

google drive

Back to Top ↑

Microsoft Word

Back to Top ↑

macro

Back to Top ↑

decoy

Back to Top ↑

hello

Hello World!

less than 1 minute read

I have migrated my blog from Keystone.js to Jekyll. I have also switched from self hosting to using GitHub pages.

Back to Top ↑

sandbox

Back to Top ↑

VirusTotal

Back to Top ↑

3rd-party

Back to Top ↑