In this article, we’ll discover various methods to read, write and manipulate the meta-data information recorded in a variety of file types. In order to
In this article, we will learn to use EvilOSX tool which is a Remote Administrator tool (RAT ) for initializing foothold on MacOS/OSX like platform.
Today we are going to take another CTF challenge from the series of Symfonos. The credit for making this VM machine goes to “Zayotic” and
In this article, we will learn how to use retina, “a vulnerability scanner” to our best of advantage. There are various network vulnerability scanners, but
Here in this article, we will introduce a line-oriented text editor command i.e. “ed” that generates, displays, alters, and operates on text files. All ed
In this post, we will introduce the multiple ways for hiding any text that are based on Audio, Image, Video and White text. For achieving
Today we are going to take another CTF challenge from the series of Matrix. The credit for making this VM machine goes to “Ajay Verma”
This article will take our readers through all about Stream Editor (Sed), which is one of the most prominent text-processing services on GNU/Linux. In this
Escalate_Linux is an intentionally developed Linux vulnerable virtual machine. The main focus of this machine is to learn Linux Post Exploitation (Privilege Escalation) Techniques. The