Blogs

April 4, 2026

Pivoting with Metasploit: A Beginner’s Guide to Network Pivoting

The Golden Rule of Pivoting:For pivoting to work, the compromised host must be connected to two or more networks . Think of it as a bridge — the compromised machine sits between you and your target.

Pivoting Security CyberSecurity Student Penetration Testing

March 15, 2026

Mastering Git: What I Learned (Part 1)

In this introductory guide, Git is outlined as an essential version control system for tracking project history and facilitating collaboration. Key concepts, including configuring user details, managing file states through staging, and creating snapshots with commit messages, are covered to help developers organize their workflow.

Git Security CyberSecurity Student Hacking

March 12, 2026

Reverse Shells vs. Bind Shells

This Blog explains the fundamental differences between bind shells and reverse shells in cybersecurity, using Netcat as a primary example. While bind shells require the attacker to connect to a listening port on the victim's machine, reverse shells force the victim to initiate the connection to the attacker. Consequently, reverse shells are the preferred method for bypassing modern firewall security controls.

Security Reverse Shells Bind Shells CyberSecurity Ethical Hacking

March 8, 2026

Building GUI Applications with C and GTK: A Week of Learning

A week-long journey transforming a console-based banking system into a professional GUI application using C and GTK 3. Details the complete process from setting up MSYS2 on Windows, designing interfaces with Glade, connecting signals to C functions, to debugging common pitfalls like OneDrive permission issues and widget identification errors. Offers practical lessons for developers seeking to add graphical interfaces to their C applications.

GTK Security GUI Development Glade Desktop Applications MSYS2

March 3, 2026

Hacking DVWA: A Deep Dive into Reflected and Stored XSS

Cross-Site Scripting (XSS) remains one of the most common and dangerous vulnerabilities in web applications. It occurs when an application takes untrusted data and sends it to a web browser without proper validation or escaping, allowing attackers to execute malicious scripts in a victim’s browser.

Reflected (XSS) Security Stored (XSS) Web Application Security

March 1, 2026

Understanding SQL Injection: A Practical Guide

Deep dive into SQL injection vulnerabilities, how they work, and Practice your skills on vulnerable applications (DVWA).

SQL Security Database Injection

February 28, 2026

Understanding Threads in Operating Systems In A simplified Form

An easy-to-understand explanation of threads in operating systems, covering their purpose, how they work, and their role in concurrency and multitasking.

Operating Systems Threads Concurrency Computer Architecture

February 26, 2026

Damn Vulnerable Web Application (DVWA): A Beginner's Guide to Web Security Testing

A comprehensive guide to setting up and using DVWA for learning web application security testing and ethical hacking techniques. Perfect for beginners in cybersecurity.

Security Penetration Testing DVWA Web Security Ethical Hacking

Coming Soon

Getting Started with Wireshark for Network Analysis

Learn how to use Wireshark to capture and analyze network traffic, identify issues, and spot security threats.

Wireshark Networking Analysis

Coming Soon

Ethical Hacking: Where to Start in 2026

A roadmap for aspiring ethical hackers, including recommended certifications, labs, and learning resources.

Ethical Hacking Career Certifications