Skip to content

H4K – IT

The Ethical Way

  • Home
  • Ethical Hacking
  • CTF
  • CTF Platform
  • Archive
  • Press-release
  • News & Events
  • Resources
  • Contact Us

Author: Kharim Mchatta

May 1, 2025Resources

Protected: YouTube

There is no excerpt because this is a protected post.

Read More
August 5, 2024Ethical Hacking

Bootcamp Cohort 2 Final Report

H4K-IT successfully hosted its second cohort, commencing on April 23rd, 2024, and concluding on July 27th, 2024. Over the course of three months, participants engaged […]

Read More
July 19, 2024Ethical Hacking

Crowd Strike Blue Screen of Death (BSOD)

Today was a challenging day for the CrowdStrike team due to the widespread outage affecting their clients using the Falcon product. Click the icon below […]

Read More
June 13, 2024Ethical Hacking

AI in the wrong hands – Chapter 2

AI in the wrong hands Chapter 2 In this chapter we will be looking at how deep fakes are being utilized by cybercriminals for malicious […]

Read More
June 5, 2024Ethical Hacking

AI in the wrong hands

AI in the wrong hands In recent years, artificial intelligence (AI) has gained significant popularity among the public and has gathered considerable attention from various […]

Read More
December 12, 2023CTF

HTB – Devvortex

This was a very interesting box called Devvortex from Hack the box where we were learning how to exploit Joomla web application security flaws. The […]

Read More
December 12, 2023CTF

HTB – Analytics

This was a very interesting box called Analtics from hack the box where we were learning how to exploit Metabase web application security flaws. The […]

Read More
June 25, 2023CTF

Vulnhub – EvilBox

This is a box from vulnhub that is rated easy by the author. The box teaches you how to LFI Vulnerability and how to FUZZ […]

Read More
June 18, 2023CTF

Vulnhub – Thales

This is a box from Vulnhub that is rated easy by the author. The box teaches you how to use Metasploit as a framework and […]

Read More
June 9, 2023CTF

Vulnhub – Breakout

This is a box from vulnhub that is rated easy by the author. The box teaches you how to perform reconnaissance and how to identify […]

Read More

Posts navigation

Older posts
Newer posts

News & Events

The Stranger in your inbox (AI fakes)

Please subscribe to get notified everytime i post new content
Loading

Cohort 3 Report

Latest Posts

  • From Cybercrime to Real Crime
  • Digital Inheritance
  • Why Now…… Introducing The New Game of Hacks
  • Supply Chain of Trust
  • The Illusion of Cloud Safety

Our Handles

Our Partners

Hackersploit
Alien-Within
Cyberspeak LC
AfricaHackon
Copyright © All rights reserved. Theme Creativ Musician by Creativ Themes