Abdul SamadHow organization get Hacked through Phishing Attacks.(Practical Social Engineering)Practical Social EngineeringOct 28, 2022Oct 28, 2022
Abdul SamadPractical Guide to Malware Analysis and Reverse Engineering(Analyzing VBA“Macros” Code P-2.2)Manually Analyzing VBA”Macros” Code P-2.2Oct 15, 2022Oct 15, 2022
Abdul SamadinSystem WeaknessHacking Wireless Networks around the Globe.(Practical WIFI Hacking)How to hack wireless networks.Sep 3, 20221Sep 3, 20221
Abdul SamadinSystem WeaknessHow to hack millions of Routers.How to hack into the almost every router.Aug 28, 20221Aug 28, 20221
Abdul SamadinSystem WeaknessPractical Guide to Malware Analysis and Reverse Engineering(Analyzing VBA“Macros” Code P-2.1)Analyzing VBA(Macros) Code P-2Jun 22, 2022Jun 22, 2022
Abdul SamadinSystem WeaknessSysmon Integration with WAZUHIntegrate Sysmon Events with Wazuh (SIEM/IDS/IPS) in WindowsMay 23, 20221May 23, 20221
Abdul SamadinSystem WeaknessPractical Guide to Malware Analysis and Reverse Engineering(Analyzing Malicious Document P-1)Analyzing Malicious MS-Office Document — P1May 12, 20221May 12, 20221
Abdul SamadinSystem WeaknessPractical Guide to Malware Analysis and Reverse Engineering (MS-Office Documents Files FormatLet’s Understand the Structure of MS-Office DocumentsMay 5, 2022May 5, 2022
Abdul SamadinBlock MagnatesPractical Guide to Malware Analysis and Reverse Engineering.Intro To Malware Analysis and Lab_SetupMay 1, 2022May 1, 2022
Abdul SamadinSystem WeaknessHow to deploy TheHive(SIRP) In ubuntu 18.04Deploying TheHive (SIRP)Apr 25, 2022Apr 25, 2022