A Digital Guardian with a Metaphysical Mind

  • Home
    • About Me
    • Get In Touch
  • CyberSecurity
    • Research & Publications
    • Cybersecurity Insights
    • CyberTools
  • Let’s Work Together
  • Personal Projects
    • Philosophy
    • Fiction by Khirawdhi
  • Twitter
  • Facebook
  • Instagram

Tag: Kali Linux

  • NBT-NS Poisoning and Exploitation with Responder

    NBT-NS Poisoning and Exploitation with Responder

    July 15, 2024
  • ICMP and How to Attack

    ICMP and How to Attack

    July 15, 2024
  • Finding and Exploiting DLL Hijacking Vulnerabilities

    Finding and Exploiting DLL Hijacking Vulnerabilities

    July 15, 2024
  • Bypassing AV – Avast, on a Windows 7

    Bypassing AV – Avast, on a Windows 7

    July 15, 2024
  • Leveraging PowerShell During Exploitation – Empire

    Leveraging PowerShell During Exploitation – Empire

    July 15, 2024
  • Understanding Same Origin Policy (SOP) and Cookies: A Practical Lab Guide

    Understanding Same Origin Policy (SOP) and Cookies: A Practical Lab Guide

    July 15, 2024
1 2
Next Page→

Khirawdhi

A Digital Guardian with a Metaphysical Mind

ona_follow
  • Mail
  • Home
    • About Me
    • Get In Touch
  • CyberSecurity
    • Research & Publications
    • Cybersecurity Insights
    • CyberTools
  • Let’s Work Together
  • Personal Projects
    • Philosophy
    • Fiction by Khirawdhi