Real Time SOC Analyst Simulation| TryHackMe SOC Simulator | Phishing Unfolding This post introduces the TryHackMe SOC (Security Operations Center) Simulator, focusing on its real-world attack simulation capabilities…
How Can XSS Be Used to Access Sensitive Files | TryHackMe The Sticker Shop The post is a detailed walkthrough of a TryHackMe challenge called “The Sticker Shop,” which explores Cross-Site Scripting (XSS)…
TryHackMe Advent of Cyber 2024 Full Walkthrough Part 2 In this post, I will be writing the second part of TryHackMe Advent of Cyber 2024 Full Walkthrough starting from Day 7. You can find the…
TryHackMe Advent of Cyber 2024 Full Walkthrough In this post, I will be solving and providing walkthrough and answers for Advent of Cyber 2024 questions and challenges. Stay tuned as I…
Basic of Reverse Engineering | TryHackMe Basic Malware RE We covered the basics and fundamentals of reverse engineering using an example room from tryhackme. The post provides also an instructional…
eJPT vs CEH : Which Cybersecurity Certification is Right for You? Two popular options for individuals at the beginning or intermediate stages of their cybersecurity journey are the eJPT (eLearnSecurity…
Powershell Study Guide | Learn Powershell Quickly PowerShell is a cross-platform automation and configuration management framework from Microsoft. It consists of a command-line shell, a…
Basics of Windows Powershell | TryHackMe Windows PowerShell This post provides a comprehensive introduction to PowerShell, a Microsoft-developed task automation and configuration management…