Extracting stored google chrome passwords
Are you curious about accessing those saved passwords that Chrome conveniently stores for you.
WatchHow hackers spoof email address
Email spoofing is a hacking technique where the sender's address is falsified, making it appear as if it came from someone else..
WatchNahamCon2023 CTF - FLOW walkthrough
Unintentional exposure of sensitive information, like quiz answers, on the client-side, allowing unauthorized access.
WatchSpring4shell practical exploitation
Practical overview and exploitation guide of Spring4Shell webshell & RCE vulnerability in Spring Core.
WatchBasic penetration testing - Tryhackme
Exploiting Tryhackme Basic Pentesting machine, covering enumeration to privilege escalation with alternate techniques.
WatchHamlet walkthrough - Tryhackme
Learners exploit misconfigurations to access a Docker container and escape it for full system access. Additional services are available for experimentation.
WatchEncoding and Decoding binary files
Base64 encoding ensures data integrity during storage and transfer, commonly used in applications like email (MIME) for non-ASCII data.
WatchNahamCon2023 CTF - HIDDEN FIGURES walkthrough
Hidden Figures challenge. Uncover secrets through advanced file analysis techniques (file carving).
Watch