Abdul SamadHow organization get Hacked through Phishing Attacks.(Practical Social Engineering)Practical Social Engineering2 min read·Oct 28, 2022----
Abdul SamadPractical Guide to Malware Analysis and Reverse Engineering(Analyzing VBA“Macros” Code P-2.2)Manually Analyzing VBA”Macros” Code P-2.23 min read·Oct 15, 2022----
Abdul SamadinSystem WeaknessHacking Wireless Networks around the Globe.(Practical WIFI Hacking)How to hack wireless networks.2 min read·Sep 3, 2022--1--1
Abdul SamadinSystem WeaknessHow to hack millions of Routers.How to hack into the almost every router.3 min read·Aug 28, 2022--1--1
Abdul SamadinSystem WeaknessPractical Guide to Malware Analysis and Reverse Engineering(Analyzing VBA“Macros” Code P-2.1)Analyzing VBA(Macros) Code P-22 min read·Jun 22, 2022----
Abdul SamadinSystem WeaknessSysmon Integration with WAZUHIntegrate Sysmon Events with Wazuh (SIEM/IDS/IPS) in Windows2 min read·May 23, 2022--1--1
Abdul SamadinSystem WeaknessPractical Guide to Malware Analysis and Reverse Engineering(Analyzing Malicious Document P-1)Analyzing Malicious MS-Office Document — P14 min read·May 12, 2022--1--1
Abdul SamadinSystem WeaknessPractical Guide to Malware Analysis and Reverse Engineering (MS-Office Documents Files FormatLet’s Understand the Structure of MS-Office Documents2 min read·May 5, 2022----
Abdul SamadinBlock MagnatesPractical Guide to Malware Analysis and Reverse Engineering.Intro To Malware Analysis and Lab_Setup2 min read·May 1, 2022----
Abdul SamadinSystem WeaknessHow to deploy TheHive(SIRP) In ubuntu 18.04Deploying TheHive (SIRP)4 min read·Apr 25, 2022----