Secjuice

NON-PROFIT CYBER GOODNESS

  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
INFOSEC

Secjuice Squeeze 57

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Ross Moore
    Ross Moore
  • Tony Kelly
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Andy74
    Andy74
  • Muhammad Luqman
    Muhammad Luqman
  • Prasanna
    Prasanna
  • Sinwindie
    Sinwindie
  • Johnathan Discreti | discreti.com
    Johnathan Discreti | discreti.com
  • Alesanco
    Alesanco
5 min read
TECHNICAL

Attack Defence: Windows Basic Exploitation #4

Hello everyone, I have returned to tackle part four of my series on Windows exploitation, in this episode you will learn how to exploit Process Builder utility to gain access to windows environment.

  • Gurkirat Singh
    Gurkirat Singh
1 min read
INFOSEC

One Step At A Time: Regulating The Worlds Largest Social Media Market

An exploration into the creeping regulation of the worlds biggest social media market.

  • Ninad Dhavase
    Ninad Dhavase
7 min read
OSINT

The OSINT Intelligence Cycle

Welcome to the very first Radio Secjuice show, in this episode we talk about the OSINT intelligence cycle.

  • Guise Bule
    Guise Bule
2 min read
OSINT

TryHackMe: Searchlight IMINT

Learn to gather information related to a target using the image and geospatial intelligence OSINT disciplines.

  • Muhammad Luqman
    Muhammad Luqman
10 min read
TECHNICAL

HTB Academy Walkthrough

This time I will be taking on the Academy box, join me on this technical HackTheBox walkthrough.

  • Andy74
    Andy74
19 min read
INFOSEC

Secjuice Squeeze 56

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Tony Kelly
  • Andy74
    Andy74
  • Sinwindie
    Sinwindie
  • Ross Moore
    Ross Moore
  • Prasanna
    Prasanna
  • Alesanco
    Alesanco
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Muhammad Luqman
    Muhammad Luqman
  • hatless1der
    hatless1der
6 min read
INFOSEC

A Briefing On The Current Status Of Cell Carrier Security

The evolution of telecom has lead us to the point where we are never too far away from our phones. It is simply astonishing what we are able to fit in our pockets and what these small computers can do.

  • Johnathan Discreti | discreti.com
    Johnathan Discreti | discreti.com
3 min read
OSINT

TryHackMe: Web OSINT Writeup

Learn the basics of gathering information related to websites using open-source Intelligence research.

  • Muhammad Luqman
    Muhammad Luqman
7 min read
INFOSEC

Secjuice Squeeze 55

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Andy74
    Andy74
  • Prasanna
    Prasanna
  • Tony Kelly
  • Ross Moore
    Ross Moore
  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Sinwindie
    Sinwindie
  • Alesanco
    Alesanco
5 min read
TECHNICAL

Unrelease Resource Stream: Sometimes Garbage Collectors Do Not Save Us

The problem of not releasing the resources we use is that over time the server fills up with things to do and is no longer able to process incoming requests, causing a disservice.

  • Alesanco
    Alesanco
8 min read
TECHNICAL

HTB Jewel Walkthrough

Let's explore an interesting box with an unusual "illogical" passage in this hack-the-box write-up.

  • Andy74
    Andy74
18 min read
INFOSEC

Secjuice Squeeze 54

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Miguel A. Calles MBA
    Miguel A. Calles MBA
  • Ross Moore
    Ross Moore
  • Andy74
    Andy74
  • Muhammad Luqman
    Muhammad Luqman
  • Prasanna
    Prasanna
  • Mike Peterson
    Mike Peterson
  • Tony Kelly
  • Sinwindie
    Sinwindie
5 min read
OSINT

OSINT In The Maritime Environment

OSINT plays a key role in the maritime environment when it comes to dealing with piracy and terrorism.

  • A-2
3 min read
INFOSEC

How Privacy Impact Analysis Can Save You From A GDPR Fine

Learn how a Data Privacy Impact Analysis can save you from a GDPR fine.

  • Bilal Mazhar MS(IS) Cyber Security II Privacy Professional
    Bilal Mazhar MS(IS) Cyber Security II Privacy Professional
3 min read
TECHNICAL

HTB Doctor Walkthrough

This time we will be taking on the HTB Doctor challenge, it seems to be an easy BOX, but perhaps not too easy.

  • Andy74
    Andy74
20 min read
TECHNICAL

RegEx: Sequence Is Important

Regular Expressions, known as RegEx, are cool,they are extremely useful and allow us to do beautiful things.

  • Alesanco
    Alesanco
3 min read
OSINT

The Curious Case Of The PERL.com Website Hijack

An OSINT-based analysis of the perl.com domain hijack incident.

  • osintme
    osintme
5 min read
INFOSEC

Secjuice Squeeze 53

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Prasanna
    Prasanna
  • Ross Moore
    Ross Moore
  • Andy74
    Andy74
  • Tony Kelly
  • Muhammad Luqman
    Muhammad Luqman
4 min read
TECHNICAL

HTB Worker Walkthrough

A technical walkthrough of the HackTheBox Worker challenge.

  • Andy74
    Andy74
17 min read
TECHNICAL

Windows Basic Exploitation #3

Part three in our series on Attack Defence Basic Windows Exploitation.

  • Gurkirat Singh
    Gurkirat Singh
2 min read
INFOSEC

Secjuice Squeeze 52

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Prasanna
    Prasanna
  • Andy74
    Andy74
  • Tony Kelly
  • Ross Moore
    Ross Moore
  • Muhammad Luqman
    Muhammad Luqman
  • Sinwindie
    Sinwindie
4 min read
TECHNICAL

Attack Defence: Basic Windows Exploitation #2

Part two of my series discussing Basic Windows Exploitation with Metasploit.

  • Gurkirat Singh
    Gurkirat Singh
2 min read
INFOSEC

Secjuice Squeeze 51

Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.

  • Tony Kelly
  • Ross Moore
    Ross Moore
  • Prasanna
    Prasanna
  • Sinwindie
    Sinwindie
  • Muhammad Luqman
    Muhammad Luqman
5 min read
TECHNICAL

Attack Defence: Basic Windows Exploitation #1

A closer look at the Attack Defence Basic Windows Exploitation Framework.

  • Gurkirat Singh
    Gurkirat Singh
2 min read
Secjuice © 2021
Linkedin Facebook Twitter Remote Browser Isolation