Security Blog

Insights, research, and thoughts on cybersecurity

> Sharing knowledge through written word <
6
Articles Published
9.5K
Total Views
696
Total Likes
200
Comments
blog_filters.conf
Categories:
Tags:

Featured Articles

FEATURED

Advanced Red Team Evasion Techniques in 2024

Exploring cutting-edge evasion methods used by modern APT groups and how red teams can leverage these techniques in their assessments.

2024-01-15
8 min read
#RedTeam#Evasion#APT
FEATURED

Zero-Day Discovery: A Methodical Approach

Step-by-step methodology for discovering zero-day vulnerabilities through systematic code analysis and fuzzing techniques.

2024-01-08
12 min read
#ZeroDay#VulnResearch#Fuzzing
2100
156
45
Read More →

All Articles

article_1.md
Red Team

Advanced Red Team Evasion Techniques in 2024

Exploring cutting-edge evasion methods used by modern APT groups and how red teams can leverage these techniques in their assessments.

2024-01-15
8 min read
1250
89
23
Read Full Article →
article_2.md
Vulnerability Research

Zero-Day Discovery: A Methodical Approach

Step-by-step methodology for discovering zero-day vulnerabilities through systematic code analysis and fuzzing techniques.

2024-01-08
12 min read
2100
156
45
Read Full Article →
article_3.md
Infrastructure

Building Resilient C2 Infrastructure

Best practices for establishing command and control infrastructure that can withstand detection and takedown attempts.

2024-01-01
10 min read
980
67
18
Read Full Article →
article_4.md
Application Security

Web Application Security: Beyond OWASP Top 10

Diving deeper into web application vulnerabilities that don't make it to the OWASP Top 10 but are equally dangerous.

2023-12-20
6 min read
1580
112
34
Read Full Article →
article_5.md
Social Engineering

The Psychology of Social Engineering

Understanding human psychology and cognitive biases to improve social engineering effectiveness in security assessments.

2023-12-10
7 min read
1320
94
28
Read Full Article →
article_6.md
Bug Bounty

Automating Bug Bounty Reconnaissance

Tools and techniques for automating the reconnaissance phase of bug bounty hunting to maximize efficiency and coverage.

2023-11-25
9 min read
2250
178
52
Read Full Article →
newsletter_signup.sh

Stay Updated

Subscribe to get notified about new articles and cybersecurity insights.