Recent Posts

Malware Tech Reversing Challenges

6 minute read

Because I want to learn more about reverse engineering, I did the MalwareTech Reversing Challenges and made a write-up of it.

Secura Ics Scada Challenge

4 minute read

A few weeks ago, I went to the hacking event Hackerhotel, and I saw this tweet ( about an interactiv...

Using Metadata To Perform Reconnaissance

1 minute read

Before hacking (red teaming, pen-testing, etc.), you must carry out a recon on the company. Almost every company has a public website with documents. These d...

Vulnerability Disclosure

1 minute read

Recently, I got a question from a young hacker about how to start with Responsible Disclosures. This is a tutorial to contribute to the online Security of Th...