Все публикации

Tips and Tricks: OTP Bypass - Method 2 (Bug Bounty Approach)

Tips and Tricks: OTP Bypass - Method 1 (Bug Bounty Approach)

Tips and Tricks: SQL Injection (Bug Bounty Approach)

Tips and Tricks: Broken Access Control (Bug Bounty Approach)

Tips and Tricks: Cobalt Strike for Red Teaming

Webinar: Unleashing the Power of Red Teaming (in English & Tagalog/Filipino)

Webinar: Improving Security in Software Development (DevSecOps Research) - In Bahasa Indonesia

Webinar: Ransomware Attacks and Countermeasures - In Bahasa Indonesia

Webinar: Improving Security in Software Development (DevSecOps Research)

Classic Windows XP Professional x64 Installation (No Audio)

Training: Security Operations Center - How to Become a SOC Analyst. A webinar at NEUST

First Look: Kali Linux 2022.4 (No Audio)

Misc: Exploring CompTIA CertMaster Labs for PenTest+ PT0 002 (in Bahasa Indonesia)

Misc: Most Prospective Cybersecurity Certifications in 2022 2023 (in Bahasa Indonesia)

Pentesting 101: Installing and Exploring Athena OS (No Audio)

Tutorial Series: Data Recovery - A Review of VM Recovery (in Bahasa Indonesia)

Security Awareness: Cybersecurity Threat Landscape and Ransomware Attack

Misc: Webinar - Hack Your Cybersecurity Career

Pentesting 101: Updating and Exploring Parrot Security OS (No Audio)

Pentesting 101: Installing Parrot Security OS (No Audio)

Tips & Tricks: Memory Forensics - Exploring Volatility for Windows (No Audio)

Tips & Tricks: An Example of TH & Malware Analysis with Security Onion and Wireshark (No Audio)

Misc: Infradigital Foundation & SGI Asia's Project - Cyber Warriors 2022

First Look: Deepin Linux 20.6 (No Audio)