
Extracting stored google chrome passwords
Are you curious about accessing those saved passwords that Chrome conveniently stores for you.
Watch
How hackers spoof email address
Email spoofing is a hacking technique where the sender's address is falsified, making it appear as if it came from someone else..
Watch
NahamCon2023 CTF - FLOW walkthrough
Unintentional exposure of sensitive information, like quiz answers, on the client-side, allowing unauthorized access.
Watch
Spring4shell practical exploitation
Practical overview and exploitation guide of Spring4Shell webshell & RCE vulnerability in Spring Core.
Watch
Basic penetration testing - Tryhackme
Exploiting Tryhackme Basic Pentesting machine, covering enumeration to privilege escalation with alternate techniques.
Watch
Hamlet walkthrough - Tryhackme
Learners exploit misconfigurations to access a Docker container and escape it for full system access. Additional services are available for experimentation.
Watch
Encoding and Decoding binary files
Base64 encoding ensures data integrity during storage and transfer, commonly used in applications like email (MIME) for non-ASCII data.
Watch
NahamCon2023 CTF - HIDDEN FIGURES walkthrough
Hidden Figures challenge. Uncover secrets through advanced file analysis techniques (file carving).
Watch