Flipper NFC & Sub-GHz Testing: What can it actually hack? Let’s Find Out!
So, you’ve got a Flipper Zero and you're wondering, can this little cyber dolphin read NFC tags like a pro and hijack my garage remote like in
So, you’ve got a Flipper Zero and you're wondering, can this little cyber dolphin read NFC tags like a pro and hijack my garage remote like in
So you may have seen this video on YouTube. If you're one of those who'd rather read than watch, congrats—you’re our kind of rebel.
Backupbuddy is an intermediate-level challenge from the OffSec Playground, perfect for those aiming for their OSCP. It’s designed to test your enumeration skills, particularly web enumeration, to uncover vulnerabilities.
Air is an intermediate-level box in the OffSec Playground. Just a heads-up for this walk-through: I’ll jump straight into the steps to get a foothold on the machine, followed
Alright, let’s dive into this box, which officially sits at an intermediate level on Offsec’s Playground called "Access". But here’s the catch: the community collectively
Introduction In this challenge, I investigated a suspicious Windows shortcut file named trick or treat.lnk. A .lnk file, also known as a Windows Shortcut file, is a file that
OffSec - Bunyip Walkthrough In this walkthrough, we’ll exploit an MD5 length extension vulnerability in a web application to gain initial access. From there, we’ll abuse sudo privileges
Walkthrough of vmdak Introduction Hello everyone! I'm back with another walkthrough. This time, I tackled "VMDak," an intermediate-level Linux box from OffSec Proving Grounds. This box
Walkthrough of BillyBoss Introduction This write-up details an intermediate-level box from Offsec's labs, rated as "Very Hard" by the community. The lab can be accessed here.
Overview This is a hands-on, simulated threat hunting sprint set within the fictional enterprise network of Megacorp One. This is a relevant and similar to what you might expect from
Walkthrough for PlanetExpress Summary In this walkthrough, we will exploit an exposed PHP-FPM FastCGI implementation to gain an initial foothold. We will then escalate privileges by exploiting a misconfiguration in
Challenge Overview Challenge Name Category Difficulty Link Sugar Free Candies Crypto Very Easy Link to Challenge Description For years, strange signals pulsed through the air on the eve of October
Challenge Overview Challenge Name Category Difficulty Link Sekur Julius Crypto Very Easy Link to Challenge Description Hidden deep in the forest was an ancient scroll, rumored to grant immense power
Co-authored by Iftekharul Haque (Hawk) Here, we first choose what kind of machine learning model we want to use in this process. As anyone with some little machine learning model
In today’s world, our workstations, servers, and mobile devices are more vulnerable than ever. They are prime targets for cybercriminals looking to execute malicious code and infiltrate networks. With