Secjuice
  • Technical
  • OSINT
  • Unusual Journeys
  • HoF
  • Write With Us
  • Hire A Writer
  • About Us
  • Rankings
Gurkirat Singh

Gurkirat Singh

Yet another noob and script kiddie. I am a failure

India •
7 posts •
TECHNICAL

Attack Defence: Windows Basic Exploitation #4

Hello everyone, I have returned to tackle part four of my series on Windows exploitation, in this episode you will learn how to exploit Process Builder utility to gain access to windows environment.

  • Gurkirat Singh
    Gurkirat Singh
1 min read
TECHNICAL

Windows Basic Exploitation #3

Part three in our series on Attack Defence Basic Windows Exploitation.

  • Gurkirat Singh
    Gurkirat Singh
2 min read
TECHNICAL

Attack Defence: Basic Windows Exploitation #2

Part two of my series discussing Basic Windows Exploitation with Metasploit.

  • Gurkirat Singh
    Gurkirat Singh
2 min read
TECHNICAL

Attack Defence: Basic Windows Exploitation #1

A closer look at the Attack Defence Basic Windows Exploitation Framework.

  • Gurkirat Singh
    Gurkirat Singh
2 min read

An Introduction To Buffer Overflow #2: Code Execution in RAM

Welcome to Part Two of my series of Buffer Overflow. If you haven't already, go and check out my first post on the subject buffer overflow #1, it makes for a good introduction

  • Gurkirat Singh
    Gurkirat Singh
4 min read
TECHNICAL

Buffer Overflow #1: Introduction

Welcome to part one in Gurkirat Singh's buffer overflow series where he gently introduces the subject.

  • Gurkirat Singh
    Gurkirat Singh
4 min read
TECHNICAL

Understanding NoSQL Injection and How to Prevent it

An injection is a security vulnerability that lets attackers take control of database queries. There is only one thing you can do, "SANITIZATION"

  • Gurkirat Singh
    Gurkirat Singh
3 min read
Secjuice © 2021
Linkedin Facebook Twitter Remote Browser Isolation