Decrypt the Hidden Codes of Cyber Security!

Get dedicated updates related to cybersecurity. 

Subscription Form

Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK

USB forensics lab using Kali Linux

Malware Campaigns

Lab Report: USB Data Deletion and Recovery

Malware Campaigns

Lumma Stealer: A Deep Dive into the Growing Malware Family

Latest Blogs

USB forensics lab using Kali Linux

Malware Campaigns

Lab Report: USB Data Deletion and Recovery

Malware Campaigns

Lumma Stealer: A Deep Dive into the Growing Malware Family

Malware Campaigns

Coyote Banking Trojan: A Growing Threat That Targets Victims via LNK

XLSM and Script-Based Cyber

Malware Campaigns

AsyncRAT: A Deep Dive into XLSM and Script-Based Cyber Attack

Latest Cybersecurity 101

BinText

BinText is a string extraction tool that extracts ASCII and Unicode strings from files and

Event Viewer

Event Viewer is a Windows tool that provides detailed logs of system and application events

Burp Suite

Burp Suite is a powerful tool for web application security, providing an integrated suite of tools

Fiddler

Fiddler is a web debugging proxy tool utilized to capture and analyze HTTP and HTTPS traffic

CFF Explorer

A CFF Explorer is a essential tool for researchers, enabling deep analysis & modification of PE files for debugging a

Hex Editor

HxD is a powerful tool for malware analysis that helps detect hidden threats, malicious code,