San3ncrypt3d Inc.

Making cybersecurity a habit & Privacy a Goal

Security Blog About Services Library

AI-ThreatMaster - An AI Powered Threat Modelling Tool

Read More

Extracting Firefox Cookies

Read More

CHATGPT vs CHATGPT - Executing System Level Commands/ RCE

Read More

Unveiling GitHub Actions - Security Awareness & Reverse $hell

Read More

Hiding Malware with NTFS ADS – Windows Patching Bypass && Stealth Mode

Read More

Shell Code Injector with AES Encryption - EDR Bypass

Read More

Golden Certificate Attack - Persistence

Read More

Recon - Azure Pentesting!

Read More

Container Breakout – Mounted Docker Socket

Read More

OWASP ZAP & GITHUB ACTION – DAST Automation from Scratch

Read More

BuffEMR Walkthrough

Read More

PivotAPI Walkthrough

Read More

Disabling LSASS protection with mimidrv.sys

Read More

Burp Suite Pro Crashing with Internal Application over NTLM authentication (Http/2 Issue)

Read More

Running ShellCode in Memory | AV Evasion – VBA Version

Read More

Ripper VulnHub Walkthrough

Read More

OT HACKING - | SCADA/ModBUS Simulator

Read More

DAST Automation with BASH

Read More

Dissection of a Client-Side Attack / Broken IAM

Read More

Privacy Invasion with Pandemic | Is Omegle safe?

Read More

Jewel HackTheBox WalkThrough

Read More

Worker HTB Walkthrough

Read More

Getting Started On Azure Pentest

Read More

Admirer walkthrough HTB

Read More

Traceback walkthrough HTB

Read More

Manual Obfuscation, Encoding/ Encrypting – FUD payload

Read More

Bypass Antivirus | FUD with NXCrypt

Read More

Metasploit Reverse Handler issue on AWS-ec2/Cloud

Read More

Linux-Explorer - Live Forensics Toolbox

Read More

DFIR Tools PART 2

Read More

Bypass Windows defender & Get reverse Shell

Read More

Spinning up AWS ec2 using terraform

Read More

DFIR Tools PART 1

Read More

Traverxec walkthrough HTB

Read More

Postman walkthrough HTB

Read More

Script to Automate Installing Pentest Tools

Read More

What do I think of Hack the box ?

Read More

PHP backdoor with Weevely

Read More

Security Onion

Read More

IOT Security & Performance comparison of cryptographic algorithms

Read More

SIEM with ELK

Read More

Static code Analysis Tools

Read More

How to setup Nebula VPN connection

Read More

ElasticSearch and WebDav Exploits

Read More

Surveillance or Privacy - Ross Anderson

Read More

Does Qubes Air solves all the security concerns ?

Read More

Jenkins Exploit

Read More

ManageEngine Desktop Central (MEDC) Exploit

Read More

Cybersecurity as Realpolitik by Dan Geer

Read More