Extracting stored google chrome passwords

Are you curious about accessing those saved passwords that Chrome conveniently stores for you.

Watch

How hackers spoof email address

Email spoofing is a hacking technique where the sender's address is falsified, making it appear as if it came from someone else..

Watch

NahamCon2023 CTF - FLOW walkthrough

Unintentional exposure of sensitive information, like quiz answers, on the client-side, allowing unauthorized access.

Watch

Spring4shell practical exploitation

Practical overview and exploitation guide of Spring4Shell webshell & RCE vulnerability in Spring Core.

Watch

Basic penetration testing - Tryhackme

Exploiting Tryhackme Basic Pentesting machine, covering enumeration to privilege escalation with alternate techniques.

Watch

Hamlet walkthrough - Tryhackme

Learners exploit misconfigurations to access a Docker container and escape it for full system access. Additional services are available for experimentation.

Watch

Encoding and Decoding binary files

Base64 encoding ensures data integrity during storage and transfer, commonly used in applications like email (MIME) for non-ASCII data.

Watch

NahamCon2023 CTF - HIDDEN FIGURES walkthrough

Hidden Figures challenge. Uncover secrets through advanced file analysis techniques (file carving).

Watch