Waseem Akram

Welcome to Our Blog

Explore the latest articles and insights from our team

Malware Development 3 - Persistence via Recycle Bin (Golang)
10/15/2024
·
Waseem Akram

Malware Development 3 - Persistence via Recycle Bin (Golang)

Today we’re gonna see an effective technique to mantain access in Windows systems during red team operations just by modifying a registry key...

Read More
Malware Development 2 UuidFromString shellcode injection (Golang)
10/14/2024
·
Waseem Akram

Malware Development 2 UuidFromString shellcode injection (Golang)

Today we’ll learn an advanced shellcode injection technique used by Lazarus group which uses UuidFromStringA API call. In this technique, the malware..

Read More
How Hackers Target Instagram Accounts & How to Protect Yourself in 2024
10/5/2024
·
Waseem Akram

How Hackers Target Instagram Accounts & How to Protect Yourself in 2024

Instahack is a security tool officially designed to test the password strength of Instagram accounts using termux and kali with a brute force attack...

Read More
Malware Development 1 - CreateRemoteThread shellcode injection (Golang)
10/1/2024
·
Waseem Akram

Malware Development 1 - CreateRemoteThread shellcode injection (Golang)

Today we’re gonna see a simple malware development technique, Shellcode injection via CreateRemoteThread in Golang...

Read More
Malware Development How to call Windows API from Go
9/30/2024
·
Waseem Akram

Malware Development How to call Windows API from Go

Today we'll see how we can use Golang internal functions from syscall and golang.org/x/sys/windows packages to call Windows API. Other languages like C o C++ are specifically

Read More
Understanding the basename Command in Linux
9/28/2024
·
Waseem Akram

Understanding the basename Command in Linux

The basename command in Linux is used to extract the last element of a file path. This is particularly helpful in bash scripts where you only need the...

Read More
Bugbounty Resources and Tools
3/1/2024
·
Waseem Akram

Bugbounty Resources and Tools

Bugbounty Resources to get started with bug bounty hunting and security research. Learn about the tools and resources that can help you...

Read More
What is Cloud Computing
3/1/2024
·
Waseem Akram

What is Cloud Computing

Cloud computing refers to the delivery of computing services over the internet (the cloud). These services include servers. servers, storage, databases, networking, software

Read More
Exploring the Potential of Serverless Computing
3/1/2023
·
Michael Johnson

Exploring the Potential of Serverless Computing

Serverless computing is a cloud computing model that allows developers to build and run applications without having to manage the...

Read More
Active Directory Pentesting resources 📚
1/9/2022
·
Waseem Akram

Active Directory Pentesting resources 📚

This post contains Active Directory Pentesting resources to prepare for new OSCP (2022) exam.

Read More
Boom Bashed 🧨💥
7/16/2021
·
Waseem Akram

Boom Bashed 🧨💥

Bashed is a retired HackTheBox machine, rated easy and rightfully. We'll start by finding a hidden web shell to quickly gaining root level access due to misconfigured...

Read More
Steganography for Beginners - Data Hiding Techniques 🔏
2/7/2019
·
Waseem Akram

Steganography for Beginners - Data Hiding Techniques 🔏

The basename command in Linux is used to extract the last element of a file path. This is particularly helpful in bash scripts where you only need the...

Read More