FreakyDodoPyramid of Pain | A conceptual cybersecurity modelA pyramid of pain is a conceptual Cybersecurity model that categorizes IOC Indicator of Compromise and TTC Tactics, Techniques &…·6 min read·Apr 28, 2024----
FreakyDodoinSystem WeaknessSecrets Unveiled: Navigating the Dark Web’s Underworld of Drugs, Guns, and EspionageAs I sit here, fingers dancing across the keys of my laptop in the dimly lit room, I can’t help but feel the rush of adrenaline coursing…·4 min read·Mar 25, 2024----
FreakyDodoinSystem WeaknessUltimate Guide to Reverse and Bind Shells: Mastering Netcat and Socat for Maximum SecurityHey Hackers!!·4 min read·Mar 18, 2024----
FreakyDodoMy Cybersecurity Homelab for Detection & MonitoringIn Cybersecurity, it could be a daunting task to apply and implement security concepts if there is an unavailability of practical and safe…·9 min read·Mar 6, 2024----
FreakyDodo“Mastering Cyber Defense: Understanding ARP Spoofing and DNS Spoofing Attacks for Robust Network…Hey Hackers!!·4 min read·Feb 6, 2024----
FreakyDodoApple Addresses Critical Zero-Day Vulnerabilities Impacting iPhones and MacsIn a recent emergency security update, Apple has identified and swiftly addressed three zero-day vulnerabilities that pose a serious threat…·2 min read·Sep 23, 2023----
FreakyDodoHow to bypass client side filters using Burp Suite ?Hey hackers!!!·3 min read·Aug 12, 2022----
FreakyDodoinSystem WeaknessThis Linux Vulnerability could get you a root terminal in a snap | Nimbuspwn VulnerabilityMicrosoft has identified multiple vulnerabilities, referred to as Nimbuspwn, that may let a hacker attain root access on many Linux desktop…·4 min read·May 1, 2022----
FreakyDodoinSystem WeaknessThis Tech_Supp0rt:1 website could get you in Scam| THM |iconvI was spending, my weekend while having a chilled beer and flicking through some good THM Machines, while flicking through something hit me…4 min read·Apr 27, 2022----
FreakyDodoinSystem WeaknessA Hack the Box Write-up|HTB Walkthrough on BackdoorRange Type·9 min read·Apr 24, 2022----