How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …

Weaponizing Raspberry Pi with The PenTesters Framework
Raspberry Pi Single Board Computers are used very frequently in security. The small and inexpensive units work very well for …
Exclusive Interview with Alexandre Teyar - the creator of BurpGPT
Dear Readers, Burp Suite and ChatGPT have been hot topics in the world of Cybersecurity. That is why we have …
Writing A Simple Ransomware Using Python
Introduction: Ransomware is a program designed to prevent a user or organization from accessing files on their computers. It encrypts …
Hashcat: A Beginner's Guide
Disclaimer: This is intended to be used solely for ethical purposes. Please make sure you don't try the below-discussed methods …
Cyber Counter-Terrorism: Shutdown
Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …
Engaging Social Engineering: Extracting Information through Strategic Interactions
Editorial note: We decided to remove any and all last names from the examples section as to not be drawn …
Exploiting SQL injection using acunetix vulnerability scanner and sqlmap
SQL injection (SQLi) SQLi is the most well-known of all web application flaws and most web application security professionals have …
When PT in ChatGPT refers to Penetration Testing
Reconnaissance and scanning A word of caution: this article makes considerable use of concepts such as Sarcasm and Irony. If …
Metasploit from Scratch
Introduction Metasploit Framework is a penetration testing technology that has new and enhanced capabilities, including automation APIs, evasion modules, and …
Slicing the Onion: An introduction to the Onion Routing
When you first searched for information about terms like “Tor network”, “deep web” or “dark web” you probably ended up …
Protecting Yourself From People Like Me
As a pentester, part of my job is running social engineering exercises. To be successful, I look for information I …
Dynamic SQLIA Detection with PHP
Introduction We’re going to discuss a dynamic approach to detect an SQL Injection Attack (SQLIA) based on a static pattern …
Cyber Threat with Chat GPT
Repetitive tasks, tons of labor hours going into mundane tasks, delayed response to complex customer queries and lack of real-time …
Modern Special Forces Of The Future (Air, Land, Sea, Cyber)
The world is becoming more complicated and unpredictable, which means that the world's armed forces need to evolve in order …
A review of some encryption methodologies and an introduction to a new methodology that may challenge the National Security Agency.
Encrypting information is not new; it's as old as the Roman Empire and even further back than that. Today the …
Impact of Artificial Intelligence on Cybersecurity
Impact of Artificial Intelligence on Cybersecurity Current advances in Artificial Intelligence (AI) are widely impacting the cybersecurity industry. Companies are …
Getting Offensive with Go
Introduction Creating Reverse Shells and bypassing Anti-Virus (AV) with Golang. Using Golang in security has become very popular over the …
A.I.-driven shields design for cyber warriors.
Since more private data is stored and transmitted digitally, cybersecurity has emerged as a pressing concern in the Internet Age. …
The process of developing tactics with the purpose of preparing for a cyberwar
Who are the cyber military powers today? Cyber military defenses are being developed by most of the developed countries in …
External Understanding: Dissecting APIs inside of IoT devices (Part 1)
Introduction As the world of IoT evolves, so does the security within this realm, like most fields. One of the …
How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …

Kismet Wireless: Network Monitoring and Analysis (W72)
Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …
Web Application Penetration Testing (W71)
Enter a short description of the course.
Mastering ChatGPT for Security Applications (W70)
Enter a short description of the course.
Hacking Blockchain based APIs (W69)
Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.
