Offensive Security Vs Defensive Security | TryHackMe Intro to Offensive Security This post provides an in-depth discussion on the topic of offensive security, explaining its key concepts, job roles, and certifications…
How to Use OpenCTI to Gather Threat Intelligence | TryHackMe Trooper In this post, we provided a comprehensive explanation of OpenCTI, a cyber threat intelligence platform, to gather cyber threat intelligence…
Hello, sorry to hear that. Please email me "consultation@motasem-notes.net" if you need anything else as I may not be able to check the comments.
Using Python to Solve Computational Problems | Hackthebox Computational Recruiting Writeup Introduction
PDF & Office Documents Malware Analysis | TryHackMe MalDoc: Static Analysis In this post, we covered malware analysis techniques and tools to analyze PDF and Microsoft office documents. We used lab material from the…
Anti Reverse Engineering | How Hackers Make Malware Undetectable & Difficult to Analyze | TryHackMe In this post, we covered the methods and techniques hackers use to make their malware difficult to analyze by reverse engineers and malware…
How to Use SQLmap to Test for SQL Injection Vulnerability | Full Tutorial In this post, we discussed and explained one of the most popular tools used for database security testing, that is, SQLmap. SQLmap is used…