Placeholder image

Hello, luvs, information security training, and certificates have been a lengthy debate over the years. In this post, I like to take you with me to my journey around this subject, it's bee...

Placeholder image

Hello Luvs,

Thousands of websites use Django from personal to cryptocurrency APIs I consider Django a reasonably secure framework. Even our cases study vulnerability discovered by the Djang...

Placeholder image

Hello Luvs,

This post is just another brain dump, like the last post. Today we are going to talk about mass exploitation. Criminals usually use mass exploitation to control as much as hosts...

Placeholder image

Hello Luvs,

This post is just a brain dump on data intelligence and flying packets. Packets aren't the only source of data, but this post is mostly about packets. I'll give you piec...

Placeholder image

Hello Luvs,

I used Python so for many years, and I feel very comfortable using it, but the issue with the Python from the beginning remains. Speed! Python isn't the most performant lang...

Placeholder image

Hello, luvs.

 

Malware is everywhere. That's why I'd like to share some thoughts on the malware analysis. We start we a brief introduction then we jump into agent tesla...