Skip to content

Hacking Articles

Raj Chandel's Blog

  • Courses We Offer
  • CTF Challenges
  • Penetration Testing
  • Web Penetration Testing
  • Red Teaming
  • Donate us
Red Teaming

DotNetToJScript: Execute C# from Jscript

February 10, 2026 by raj10 Min Reading

Modern enterprise environments rarely depend on a single security control. Instead, organizations commonly deploy application whitelisting (AppLocker / WDAC), endpoint protection, and user privilege restrictions

OSINT

Privacy Protection Checklist

January 16, 2026 by raj7 Min Reading

In today’s internet, privacy isn’t a feature, it’s a fight. Trackers, advertisers, data brokers, and even ISPs quietly map your behavior every second you stay

Cloud Security

AWS: IAM UpdateLoginProfile Abuse

January 16, 2026 by raj8 Min Reading

Identity and Access Management (IAM) is the foundation of security in every cloud platform. Misconfigurations or over-privileged identities are among the most common causes of

OSINT

Privacy Protection: Cover Your Tracks

November 5, 2025 by raj7 Min Reading

When you browse the internet, your browser is not just loading pages — it is also quietly sharing information about you. Things like your IP

OSINT

Privacy Protection Mobile – Graphene OS Setup

October 29, 2025 by raj6 Min Reading

Before we dive into the setup process, it’s important to understand why GrapheneOS stands out from standard Android and why it’s perfect for privacy-conscious users.

OSINT

Privacy Protection Mobile – Graphene OS Installation (Part 1)

October 28, 2025 by raj7 Min Reading

In today’s world, our smartphones carry more personal information than ever — from private chats and photos to banking details and real-time location data. Protecting

Red Teaming

Netexec for Pentester: File Transfer

October 17, 2025 by raj7 Min Reading

NetExec (NXC) file transfer is a must‑know technique for pentesters and red teamers who need reliable, cross‑protocol methods to move payloads, exfiltrate data, or stage

OSINT

Privacy Protection: Metadata Cleaner

October 9, 2025 by raj13 Min Reading

Metadata is the invisible data within your files — information that describes the file’s details rather than its content. Think of it as a digital

Cloud Security

AWS: IAM CreateLoginProfile Abuse

October 3, 2025 by raj7 Min Reading

Identity and Access Management (IAM) is the foundation of security in every cloud platform. Misconfigurations or over-privileged identities are among the most common causes of

Posts pagination

1 2 … 155 Next

Categories

© All Rights Reserved 2021 Theme: Prefer by Template Sell.