Articles

A discursive source of knowledge on Information Security including topics on Pentesting,
Bug Bounty, Red Teaming, Threat Hunting, Hacking Stories, and more.

Xbox Underground

Xbox Underground

In this article, we explore the story of David Pokora, who went from being an avid Xbox gamer to a notorious hacker and leader of Xbox-Underground.

read more
Reverse Engineering-Hacking Tools

Reverse Engineering-Hacking Tools

Reverse engineering involves dissecting objects, both physical and digital, to comprehend their inner workings, enabling us to replicate, enhance, or secure them. We’ll explore essential tools such as Ghidra, Binary Ninja, Apktool, and Javasnoop, which empower engineers and security experts to unravel and optimize software.

read more