San3ncrypt3d Inc.
Making cybersecurity a habit & Privacy a Goal
Security Blog
About
Services
Library
AI-ThreatMaster - An AI Powered Threat Modelling Tool
Read More
Extracting Firefox Cookies
Read More
CHATGPT vs CHATGPT - Executing System Level Commands/ RCE
Read More
Unveiling GitHub Actions - Security Awareness & Reverse $hell
Read More
Hiding Malware with NTFS ADS – Windows Patching Bypass && Stealth Mode
Read More
Shell Code Injector with AES Encryption - EDR Bypass
Read More
Golden Certificate Attack - Persistence
Read More
Recon - Azure Pentesting!
Read More
Container Breakout – Mounted Docker Socket
Read More
OWASP ZAP & GITHUB ACTION – DAST Automation from Scratch
Read More
BuffEMR Walkthrough
Read More
PivotAPI Walkthrough
Read More
Disabling LSASS protection with mimidrv.sys
Read More
Burp Suite Pro Crashing with Internal Application over NTLM authentication (Http/2 Issue)
Read More
Running ShellCode in Memory | AV Evasion – VBA Version
Read More
Ripper VulnHub Walkthrough
Read More
OT HACKING - | SCADA/ModBUS Simulator
Read More
DAST Automation with BASH
Read More
Dissection of a Client-Side Attack / Broken IAM
Read More
Privacy Invasion with Pandemic | Is Omegle safe?
Read More
Jewel HackTheBox WalkThrough
Read More
Worker HTB Walkthrough
Read More
Getting Started On Azure Pentest
Read More
Admirer walkthrough HTB
Read More
Traceback walkthrough HTB
Read More
Manual Obfuscation, Encoding/ Encrypting – FUD payload
Read More
Bypass Antivirus | FUD with NXCrypt
Read More
Metasploit Reverse Handler issue on AWS-ec2/Cloud
Read More
Linux-Explorer - Live Forensics Toolbox
Read More
DFIR Tools PART 2
Read More
Bypass Windows defender & Get reverse Shell
Read More
Spinning up AWS ec2 using terraform
Read More
DFIR Tools PART 1
Read More
Traverxec walkthrough HTB
Read More
Postman walkthrough HTB
Read More
Script to Automate Installing Pentest Tools
Read More
What do I think of Hack the box ?
Read More
PHP backdoor with Weevely
Read More
Security Onion
Read More
IOT Security & Performance comparison of cryptographic algorithms
Read More
SIEM with ELK
Read More
Static code Analysis Tools
Read More
How to setup Nebula VPN connection
Read More
ElasticSearch and WebDav Exploits
Read More
Surveillance or Privacy - Ross Anderson
Read More
Does Qubes Air solves all the security concerns ?
Read More
Jenkins Exploit
Read More
ManageEngine Desktop Central (MEDC) Exploit
Read More
Cybersecurity as Realpolitik by Dan Geer
Read More