Published inT3CHTryHackMe | x86 Assembly Crash Course | WriteUpA crash course in x86 assembly to enable us in malware reverse engineering1d ago11d ago1
Published inT3CHTryHackMe | macOS Forensics: The Basics | WriteUpLearn the basics to prepare for performing forensics on macOS3d ago3d ago
Published inT3CH6 ChatGPT Prompts To Make Money With YouTubeHow ChatGPT can help you to solve your problems3d ago3d ago
Published inT3CH8 ChatGPT Prompts For Quick LearningHow ChatGPT can help you to solve your problems4d ago4d ago
Published inT3CHTryHackMe | SimpleHelp: CVE-2024-57727 | WriteUpLearn how attackers can exploit CVE-2024-57727 and how to detect that5d ago5d ago
Published inT3CHTryHackMe | Diskrupt | WriteUpFix the damaged disk, analyse the filesystem, and recover the deleted files5d ago5d ago
Published inT3CHTryHackMe | Basic Static Analysis | WriteUpLearn basic malware analysis techniques without running the malwareMar 29Mar 29
Published inT3CHTryHackMe | Public Key Infrastructure | WriteUpLearn about Public Key Infrastructure and why it’s important to secure certificate lifecyclesMar 27Mar 27
Published inT3CHTryHackMe | Next.js: CVE-2025–29927 | WriteUpExplore an authorization bypass vulnerability in Next.jsMar 25Mar 25
Published inT3CHTryHackMe | Lessons Learned | WriteUpA look into the fifth phase of the Incident Response framework: Lessons LearnedMar 24Mar 24