Jump to content
  • Create New...

Search the Community

Showing results for tags 'hacking'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • HOME
    • Shell_Meet
    • Shell_Talk
    • Board Meet
    • Announcements and Updates
    • Shell_Update
    • Pending Approvals
    • Member Introductions
    • Shell_Crew Support
    • Ctf Updates & Walkthroughs
    • Latest CVE-Info
    • Android/IOS Pentesting
    • Reverse Engineering
    • IoT Exploitation
    • Malware Analysis
    • API Pentesting
    • Cloud Security
    • Off-topic Lounge
    • Internships
    • Career Discussion
    • Mentorship
    • Career Guidance
    • P5 (Informational Bugs)
    • P4 (Low-Level Bugs)
    • P3-P2 (High-Level Bugs)
    • P2-P1 (Critical Bugs)
    • Vulnerability Chaining
    • Report Writing
    • Personal Hunting Methodology
    • Front-End Development
    • Scripting
    • Backend-Development
    • Application Development
    • Linux Kernel and OS Developers
    • Hardware Programming
    • DevOps
    • Queries Assessment
    • Penetration Testing (Risk Assessment)
    • Red Teaming (Risk Assessment)
    • Blue Teaming (Risk Assessment)
    • Exploit Development (Risk Assessment)
    • OSINT-External and Internal (Threat Intelligence)
    • IOC (Threat Intelligence)
    • Awareness (Reinforcement)
    • Digital Forensics (Security Operations)
    • SOC & SIEM
  • Bug-Hunters's Resources
  • Open Source Contribution's Topics
  • Pentesting's Resources
  • SDR & AutoMobile Pentesting's Topics
  • Networking's Topics
  • Networking's Network Resources


  • Open Source Contribution's Blogs


  • Bug-Hunt
  • Penetration Testing
  • Blue-Teaming

Product Groups

There are no results to display.


  • Pentesting
  • Bug-POC Videos
  • CTF-Walkthrough
  • Scripting
  • Bug-Hunters's Videos
  • SDR & AutoMobile Pentesting's Videos
  • Networking's Videos


  • Pentesting
  • Bug-Hunting
  • SDR & AutoMobile Pentesting's Tutorials

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me

Found 4 results

  1. Hi Guys . This is my first writeup in shell crew , So plz ignore my grammertical and spelling mistake😝... So many newbie when they come to cybersec field and ask to anyone how to start then , every experience person says , complete your basic . That's totally correct to clear the basic because its helps to understand and figure out cybersecurity stuffs in future.... So , the problem is that almost no will come and personally teach you the basic, and Don't know that what are the topics that he/she should to clear the basic ... Now many people will say that everything is already available on internet, but there you will not can get in proper categories manner or step by step process So, to help new people in Cyber sec i made a github repo where i made alll the basic in step by step manner with lessons Its just a small contribution by me ..........i know people there doing more better then me but i blv if even one person get help by my repo . That's enough for me My repo - https://github.com/rhonnysharma/Beginner Ok Now lets assume you are that person why cleared all your basic thet you can vist this repo - https://github.com/rhonnysharma/Web-Pentesting In my repo you will get all the latest - Checklist, latest bypass payload, roadmap etc that will be from twitter-Instragram-various infosys writeups....... Benifits---> No need to figure out latesr tips, payload methods etc from twitter-Instragram-various infosys writeups. Get ecerything from one place Thanks For Reading 😛
  2. Hi Fam !!! 😷😷💫❣️Hope everyone's doing good today. In my previous post I tried to give you a quick and brief introduction to Malware Analysis, today we're going to dive a little deeper and let the knowledge sink in through our nerves. So without any further ado lets get started. Generally, there are four types of Malware Analysis which are classified on the criteria of their analysis techniques. Which are listed as follows :- Static Analysis Dynamic Analysis Hybrid Analysis Code Analysis Memory Forensics Static Analysis : Static Analysis is a procedure of analyzing a binary without actually executing it. It is the easiest to perform and allows to extract the "metadata" associated with the suspect binary. This can be useful in those cases where the analyst need to pinpoint the malicious infrastructure, libraries and the packed files. In addition, tools like disamblers and network analyzers can be drawn on to collect those "information" or "how the malwares actually work". Dynamic Analysis : Dynamic Analysis is additionally known as by the term Behavioral Analysis. It is a method of executing a suspect binary in a complete isolated habitat and monitoring its behavior and demeanor. This=comes in handy but there's a drawback that it does not reveal all the functionalities of a hostile program. Dynamic Analysis provides, threat hunters and incident responders with deeper visibility allowing them to cover the true intent and nature of the threats. Hybrid Analysis : Now the Term "Hybrid" is preety self explanatory. Yes, it used the above two techniques (i.e Static and Dynamic) by combining them for its higher efficiency and providing the best approach. It helps in the cases when sophisticated malwares are coded so as to camouflage and conceal itself from the presence of sandbox technology. Code Analysis : This technique is quite advanced and focuses on analyzing the code from its "inner workings" of the binary. This technique also disclose and babble that is impossible to determine from Static and Dynamic Analysis. Code Analysis are again divided into two more category namely they are: static code analysis dynamic code analysis Memory Forensics : Memory Forensics is also known as Memory Analysis. It is a reference to the examination of volatile data in computers memory dump or investigating computers RAM for memory artifacts. It is more like a forensic technique for security professional to scrutinize and identify that do not leave any tract in computers Hard Drive. We shall discuss the Code Analysis and Memory Analysis in our subsequent chapters. ~~ With Best Regards MRMIME HAPPY LEARNING
  3. Hi Fam! 😷😷Today we're gonna talk about a term we have preety much come across or heard about it in the field of Digital Security i.e "Malware Analysis" well by word we can estimate it quickly. Basically, its actually a field of study in Cyber Security of how Malwares perform. Now the word "Malware" is actually a Collective term for Viruses, Trojan Horses, Rootkits,Spyware. This Malwares now have different functionalities which depends on the intent of coding. The elemental and basic purpose it to harm the host OS and steal their Credentials be it Huge Organizations and Huge Companies or even a normal user.The goal of malware analysis is to determine the capability of malware, detect it, and contain it. It also helps in determining identifiable patterns that can be used to cure and prevent future infections. There are a few key reasons to perform malware analysis: Malware detection — To better protect an organization, you need to be able to identify compromising threats and vulnerabilities. Threat response — To help you understand how these threats work so you can react accordingly to them. Malware research — This can help you to better understand how specific types of malware work, their orientation and what differentiates them. Here are few of the Best Malware Analysis Tools and Their Features Fiddler. WireShark. x64dbg. PeStudio. Process Hacker. Process Monitor (ProcMon) ProcDot. Autoruns. With BEST REGARDS ~~ MRMIME
  4. CTF(Capture The Flag) - Hack the Box 👩‍💻♥️💫✨ If you are looking for opportunities to expand your horizons and learn more about digital security. Then CTF is probably the Stuff you should give it a Try & HTB(Hack the Box) is one such example. Here I'm going to Share the Top Pentesting Labs you should Venture and Aim for if You are having an higher level of Appetite. ~ With Best Regards MR.MIME ✌️💫 Happy Learning