Elsaid SalemCustom Attacks: a complete brute force programWelcome back to the 21st iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…4 min read·Feb 2, 2021----
Elsaid SalemCustom Attacks Part 4:Welcome back to the 20th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…5 min read·Jan 26, 2021----
Elsaid SalemCustom Attacks Part 3:Welcome back to the 18th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…7 min read·Jan 20, 2021----
Elsaid SalemCustom Attacks Part 2: cracking passwordsWelcome back to the 17th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…7 min read·Jan 12, 2021----
Elsaid SalemCustom Attacks Part 1: Laying down the foundationsWelcome back to the 17th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…5 min read·Jan 4, 2021----
Elsaid SalemPassword security: brute-forcing and Big O notationWelcome back to the 16th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…5 min read·Dec 29, 2020----
Elsaid SalemReverse Engineering: coding for cybersecurityWelcome back to the 15th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…1 min read·Dec 22, 2020----
Elsaid SalemPasswords in the clear: Leviathan 0Welcome back to the 14th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…1 min read·Dec 15, 2020----
Elsaid SalemThe Final Bandit: more git, bash variablesWelcome back to the 13th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…7 min read·Dec 8, 2020----
Elsaid SalemData Loss Prevention: gitWelcome back to the 12th iteration of this blog series. In this series, we’re growing our cybersecurity knowledge starting from the very…4 min read·Dec 1, 2020----