Hello, sorry to hear that. Please email me "consultation@motasem-notes.net" if you need anything else as I may not be able to check the comments.
Using Python to Solve Computational Problems | Hackthebox Computational Recruiting Writeup Introduction
PDF & Office Documents Malware Analysis | TryHackMe MalDoc: Static Analysis In this post, we covered malware analysis techniques and tools to analyze PDF and Microsoft office documents. We used lab material from the…
Anti Reverse Engineering | How Hackers Make Malware Undetectable & Difficult to Analyze | TryHackMe In this post, we covered the methods and techniques hackers use to make their malware difficult to analyze by reverse engineers and malware…
How to Use SQLmap to Test for SQL Injection Vulnerability | Full Tutorial In this post, we discussed and explained one of the most popular tools used for database security testing, that is, SQLmap. SQLmap is used…
Wireshark Reference Notes This e-book is intended to be used as quickreference to facts and information on the use of Wireshark for network analysis. Additionally…
Nmap Scanner | Complete Course | Scanning Networks & Vulnerabilities | OSCP In this short course, we covered the popular network scanner, nmap. We discussed scanning types starting with basic scans all the way till…
How to Scan For Vulnerabilities | FREE Short Course In this short course, we covered vulnerabiltiy scanning & management in cyber security along with the tools used to scan for…
TryHackMe Log Universe Writeup In this article, we solve the room named: “TryHackMe Log Universe“. Its very important that you open the VM in the room to be able to…