WELCOME TO MY SPACE!
Check out my projects
At RIT (Rochester Institute of Technology), during the course Computer System Security, we were required to create a pentest lab or…
After the creation of the vulnerable victim machine explained in Part 1, we had to set up the vulnerable machine with an SIEM, to…
Part 2 detailed the process of setting up Wazuh SIEM, as well as how it logs and presents information. In this part, it’s about how we…
After spending hours (reasonably long time) breaking into other machines and exploiting vulnerabilities, it’s time to see what happened to…
A few weeks ago, I got my hands on an old Android TV box from a telecom company. It had an ARM A7 processor, 2GB RAM, and 8GB storage—…
While sharing links of different websites online, I came across the feature of Open Graph metadata or metatag, which many websites utilize to provide better visibility of their content of that website...
An SMS from “Salik” which asks user that a toll amount that has not been paid. As of 02–06–2025, 11:13 pm, only this website works -https://sailikaeoiem.com/ii/home.html.