Create CloudInit Ubuntu Image on Proxmox
If you want to build a reusable Ubuntu template for your Proxmox environment, here’s a step-by-step guide with example screenshots. My Configurations: Stora...
Read MoreIf you want to build a reusable Ubuntu template for your Proxmox environment, here’s a step-by-step guide with example screenshots. My Configurations: Stora...
Read MoreToday’s article is about bypassing the domains blocked on browsers by using Microsoft Intune policies, Which is a cloud-based servic...
Today i’m gonna publish a threat hunting that I had done it since 24/8/2023 posted on X “Twitter” to be documented here. Have fun re...
Analysis Summary A .NET InfoStealer malware infecting windows devices through malicious advertising that could be navigated by the u...
Finally elementaryOS 8 has been released and available to download with a lot of changes and improvements like Creating a new Secure...
من بعد ما نزل تطبيق Telephony اللي بيتيح لمصلحة الجمارك المصرية للتحقق من حالة الهواتف المستوردة إلى البلاد بدأ تظهر تخوفات تجاه الت...
Introduction Lately I was trying to port kali nethunter to my old phone with supported external wifi card and things to be worked w...
Introduction Convert windows virtual machine to a lab for malware analysis using ansible playbooks for automated installation of ma...
Introduction Most of the malwares in the wild are adding some protections techniques to their malicious software against Virtual Ma...
Introduction ChatGPT desktop is stealer malware that have spreaded by some facebook pages that can steal your social media credentia...
This article is about creating your own pentesting operating linux which is depends on Archlinux distribution. We will go from basic...
Introduction In this blog post i’m going to setup a windows server on my local machine which is vulnerable for different types of wi...
I have participated in EG-CTF which is organized by EG-CERT and this a writeup for snowball, a reverse engineering CTF challenge. ...
I have participated in EG-CTF which is organized by EG-CERT and this a writeup for Process Enumeration a reverse engineering CTF cha...
In this blog post i will show a technique to inject a shellcode backdoor inside a PE file. Introduction In this post i will inject...