Posts
All the articles.
Raspberry Pi: Motion Detection
Published: at 12:06 PMHave you ever wanted to build a system that can detect movement and capture photos? With a Raspberry Pi, a PIR motion sensor, and a camera module, this project becomes easy and fun! In this guide, we’ll walk you through setting up a simple motion detection system.
Bind Shells: A Practical Guide
Published: at 05:19 PMIn continuation of the discussion on reverse shells, we now shift our focus to bind shells. Both methods offer remote access to systems, but while reverse shells require the target machine to connect back to the attacker's system, bind shells work the opposite way.
Reverse Shells: A Practical Guide
Published: at 10:51 PMIn the world of penetration testing, a reverse shell is a crucial concept. It allows an attacker to connect back to their own machine from a compromised target. Once connected, the attacker can execute commands on the target system, enabling various post-exploitation techniques.
Taking ffuf Fuzzing Further
Published: at 07:06 PMIn the second part of the guide, we’ll cover more advanced techniques, including the use of many wordlists in different fuzzing modes (such as clusterbomb, pitchfork, and sniper). How to leverage powerful matchers and filters. Additionally, we’ll explore scenarios, such as fuzzing POST requests with complex data structures like JSON, and how to work with HTTP headers.
Git Credential Management
Published: at 11:02 PMGit is the backbone of modern software development, helping developers manage and collaborate on code. When working with remote repositories, such as GitHub or GitLab, secure credential management becomes essential. Without proper management, you could find yourself constantly entering your username and password, which slows down your workflow and increases the risk of security issues.