There is no excerpt because this is a protected post.
Bootcamp Cohort 2 Final Report
H4K-IT successfully hosted its second cohort, commencing on April 23rd, 2024, and concluding on July 27th, 2024. Over the course of three months, participants engaged […]
Crowd Strike Blue Screen of Death (BSOD)
Today was a challenging day for the CrowdStrike team due to the widespread outage affecting their clients using the Falcon product. Click the icon below […]
AI in the wrong hands – Chapter 2
AI in the wrong hands Chapter 2 In this chapter we will be looking at how deep fakes are being utilized by cybercriminals for malicious […]
AI in the wrong hands
AI in the wrong hands In recent years, artificial intelligence (AI) has gained significant popularity among the public and has gathered considerable attention from various […]
HTB – Devvortex
This was a very interesting box called Devvortex from Hack the box where we were learning how to exploit Joomla web application security flaws. The […]
HTB – Analytics
This was a very interesting box called Analtics from hack the box where we were learning how to exploit Metabase web application security flaws. The […]
Vulnhub – EvilBox
This is a box from vulnhub that is rated easy by the author. The box teaches you how to LFI Vulnerability and how to FUZZ […]
Vulnhub – Thales
This is a box from Vulnhub that is rated easy by the author. The box teaches you how to use Metasploit as a framework and […]
Vulnhub – Breakout
This is a box from vulnhub that is rated easy by the author. The box teaches you how to perform reconnaissance and how to identify […]
