Our Blog

Resources and insights

The latest industry news, interviews, technologies, and resources.

Things to Try When your Reverse Shell Fails

Things to Try When your Reverse Shell Fails

Target enumerated, check.Vulnerability identified, check.Tested payload delivery, check.RCE verified, check.Reverse shell...nope. Today we are going to look at some practical ways to troubleshoot your reverse shell. Some of these points come from logical thinking,...

read more
So You Want to Be a Hacker: 2023 Edition

So You Want to Be a Hacker: 2023 Edition

Video Version: Introduction The past two years, we've posted blogs on how to become an ethical hacker. Given that these blogs have been well received, we have brought back yet another edition. So, without further ado, let's chat about how you can break into the field...

read more
Linux Isn’t Scary

Linux Isn’t Scary

Learning Linux is essential for aspiring ethical hackers. Start learning the fundamentals today and you will be well on your way to a career in cybersecurity.

read more
Getting Started with Prototype Pollution

Getting Started with Prototype Pollution

Prototype pollution allows an attacker to modify the prototype of an object. This means we can potentially assign new properties or methods to an object. Furthermore, we may be able to overwrite existing properties. If you’re unfamiliar with prototypes and...

read more

Stay Ahead of Cyber Threats

Get expert insights on the latest penetration testing strategies, emerging vulnerabilities, and cybersecurity best practices—straight to your inbox.

Loading form...