Blogs
April 4, 2026
Pivoting with Metasploit: A Beginner’s Guide to Network Pivoting
The Golden Rule of Pivoting:For pivoting to work, the compromised host must be connected to two or more networks . Think of it as a bridge — the compromised machine sits between you and your target.
March 15, 2026
Mastering Git: What I Learned (Part 1)
In this introductory guide, Git is outlined as an essential version control system for tracking project history and facilitating collaboration. Key concepts, including configuring user details, managing file states through staging, and creating snapshots with commit messages, are covered to help developers organize their workflow.
March 12, 2026
Reverse Shells vs. Bind Shells
This Blog explains the fundamental differences between bind shells and reverse shells in cybersecurity, using Netcat as a primary example. While bind shells require the attacker to connect to a listening port on the victim's machine, reverse shells force the victim to initiate the connection to the attacker. Consequently, reverse shells are the preferred method for bypassing modern firewall security controls.
March 8, 2026
Building GUI Applications with C and GTK: A Week of Learning
A week-long journey transforming a console-based banking system into a professional GUI application using C and GTK 3. Details the complete process from setting up MSYS2 on Windows, designing interfaces with Glade, connecting signals to C functions, to debugging common pitfalls like OneDrive permission issues and widget identification errors. Offers practical lessons for developers seeking to add graphical interfaces to their C applications.
March 3, 2026
Hacking DVWA: A Deep Dive into Reflected and Stored XSS
Cross-Site Scripting (XSS) remains one of the most common and dangerous vulnerabilities in web applications. It occurs when an application takes untrusted data and sends it to a web browser without proper validation or escaping, allowing attackers to execute malicious scripts in a victim’s browser.
March 1, 2026
Understanding SQL Injection: A Practical Guide
Deep dive into SQL injection vulnerabilities, how they work, and Practice your skills on vulnerable applications (DVWA).
February 28, 2026
Understanding Threads in Operating Systems In A simplified Form
An easy-to-understand explanation of threads in operating systems, covering their purpose, how they work, and their role in concurrency and multitasking.
February 26, 2026
Damn Vulnerable Web Application (DVWA): A Beginner's Guide to Web Security Testing
A comprehensive guide to setting up and using DVWA for learning web application security testing and ethical hacking techniques. Perfect for beginners in cybersecurity.
Coming Soon
Getting Started with Wireshark for Network Analysis
Learn how to use Wireshark to capture and analyze network traffic, identify issues, and spot security threats.
Coming Soon
Ethical Hacking: Where to Start in 2026
A roadmap for aspiring ethical hackers, including recommended certifications, labs, and learning resources.