Publishing Information Security Articles and Write-ups

Misconfigs conquered, identities claimed.Compromise the machine and get the flags.

Employees reported login issues with Outlook, and the Exchange admin couldn’t access the Exchange Admin Center. Investigation revealed a ransomware…

Codify provides a realistic simulation of a web application environment with a variety of challenges to test your penetration testing…

This content discusses the challenges of analyzing diverse log file formats, introducing ZUI, a graphical user interface for the Zed…