What's New?Most RecentNo Replies YetNo Solutions YetDerrick's Doughnut Admin In the Intro to Web App Hacking: Mapping Web Applications course, the last step I'm instructed to: Return to the /login page and log in as the admin of the site. What is the token you receive? www...Reverse Engineering SmokeLoader: An In-Depth Analysis (Part 3)2 MIN READ The previous blog entry covered how SmokeLoader uses various obfuscation techniques to slow reverse engineers down. We also identified yet another shellcode being allocated to a memory region, which ...Foundational Static Analysis: API Analysis Hi all, I'm stuck in this part, where using Ghidra, I have to find where the Windows API GetModuleHandleA is used, in the binary called exercise_two.exe, and once located, find the parameter of thi...Welcome, new members! Last week we were joined by fammyid vsm28 Bilal3796 AzMM admiral ayodeji MohammedAlareimi BexBug arelir MegMarCyberTrust Ayo JCD13 TLamb arthurk JM1 rachelmerendino Taibat nelsonvelez tk7720 NotAStar...Immersive Community Meetup - Bristol Come and join us for another evening of cybersecurity talks and demos. Agenda 18:00 - 19:30: Doors open / Networking / Food & Drink 19:30 - 20:00: Presentation 1 20:00 - 20:30: Presentation 2 2...Global Cyber Drills: Dates, Locations, and VIP Experiences2 MIN READ Our Cyber Drills Roadshow is kicking off in North America! I’m thrilled to share that in just one week, we will launch the North American leg of our 2025 Cyber Drill roadshow. In addition to const...When the Lights Went Out at Heathrow: A Crisis That Was Never Meant to Be “Won”4 MIN READ In the early hours of March 21, 2025, a fire broke out at the North Hyde electrical substation in West London, just a few miles from Heathrow Airport. Within hours, a local infrastructure incident ha...Welcome, new members! Happy Friday and welcome to our newest members around here 👋 GrahamR TT2 coltonmike1 ChrisHotchin AlexAugot Dord Namitch schdry Olane123 Uptick AlasdairD Sidra ralyn1234 martelp impractialJoker S...Cyber Drills and Outcome-Based Programs: A Hands-On Approach to Cyber Resilience3 MIN READ What are cyber drills and outcome-based programs? Cyber drills vs. outcome-based programs Cyber drills Prove Outcome-based programs Improve Simulate a realistic cyberattack ...AI-pril Fools: The Return of the Puppetmaster Virtual Crisis Sim LIVE Don't be fooled by the date – this is no laughing matter. Register your attendance here The Puppetmaster is back, and this time, your communication lifelines are their target. Prepare to face a...
Tagshelp & support147defensive cyber58cyber pro57cyber threat intelligence52application security45getting started35cloud security35offensive cyber35cyber crisis simulations32tips & tricks31