The question that might come naturally after reading this title is:Why should you know how to code a shellcode runner for your malware analysis? Malware analysis is a dark art....
In this article I want to introduce you to command injection with a very simple practical example.I also suggest you read the code of the target application in order to...
This article is an introduction to what is Cyber Kill Chain and how it works. Maybe if you follow some cybersecurity podcast, newsletter etc. you have heard about that, but...
What is SQL injection? SQL injection (SQLi) is an attack on a web application (among the most known along with XSS) that exploits a security vulnerability in a target software,...
Are you familiar with malware analysis? It's an essential aspect of cybersecurity that deserves a closer look. In this article, we'll provide a concise yet comprehensive overview of malware analysis...
Just as a quick refresh: Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications. XSS enables attackers to inject client-side scripts into Web pages...
Welcome to our in-depth exploration of software reverse engineering! While we cannot possibly cover every aspect of this vast topic in a single article, we strive to provide you with...
In this article, we will crack Cesar's cipher on a PicoCTF challenge using our beloved Python. We have already talked about the Caesar cipher, both in theory and in practice,...
Are you ready to implement substitution ciphers with your own hands and take your encryption skills to the next level? In our previous article, we explored the fascinating world of...
Substitution ciphers are one of the simplest and oldest methods of encryption. They involve replacing plaintext letters or characters with others in a fixed pattern to create ciphertext. They represent...
Server-side request forgery (SSRF) is a type of web application vulnerability that allows an attacker to send a crafted request from a vulnerable web application to an arbitrary destination. This...
In this tutorial, I'm going to show you how to exploit the file inclusion vulnerability in DVWA! But before doing that, for those of you who have not yet read...
StackZero is a technical coding blog that focuses on cybersecurity. It mainly offers articles and tutorials that teach readers how to write security tools.
The blog covers a wide range of topics, from the basics of cryptography to the more advanced topics of exploitation and reverse engineering.