• HOME
  • BLOGS
  • ABOUT
  • CONTACT



Learn. HAck. Patch.
REpeat



“To hack a system requires getting to know its rules better than the people who created it or are running it, and exploiting all the vulnerable distance between how those people had intended the system to work and how it actually works, or could be made to work.”
― Edward Snowden, Permanent Record



Security Blog



Get inspired,



A computer that is deemed secure today will not remain secured indefinitely



24th September, 2023



Computers were initially developed to address or aid specific problems for e.g., to perform complex calculations. Thus initially, ‘digitally’ securing computer...

read more

Breaking Down Cybersecurity Professions



20th December, 2023



Being Ethical Hacker/Penetration Testers are not the only professions in Cybersecurity. Let's Explore more about the lesser known domains..


read more

The Art of Social Engineering: Protecting Yourself from Psychological Hacks



Coming Soon...



This article could explore the tactics and techniques used by cybercriminals in social engineering attacks. It would provide examples of common scams and manipulation tactics, as well as offer practical advice on how to identify and protect oneself from these psychological hacks.


read more

Mobile Security: Safeguarding Your Devices in a Connected World



Coming soon...



With the increasing reliance on mobile devices, this blog post could discuss the importance of mobile security and offer tips for securing smartphones and tablets. It could cover topics such as secure app usage, protecting personal information, and securing mobile networks

read more

Projects.




TryHackMe
CTFs
</>
HackTheBox
CTFs
</>
Scripts
</>
Pentesting Tools
Guide
</>

By Rutvik Belapurkar