Cyber-Security

Build Your First Password Cracker

Build Your First Password Cracker

Disclaimer This article is solely for educational purposes. The techniques discussed herein should not be used for unlawful activities. Learning Objectives By the end of this walkthrough, readers will: Understand common password-cracking techniques like brute-force, dictionary attacks, etc. Learn how cryptographic hashing and salting work to secure passwords Build a basic password-cracking prototype to demonstrate …

Build Your First Password Cracker Read More »

How to make a Keylogger Payload Undetectable

How to make a Keylogger Payload Undectatable

This article is strictly for educational purposes and not to be used maliciously; the writer can not be held liable for any infraction. Use with discretion. Keylogger payloads refer to malicious software that monitors keystrokes on a system without authorization. While the principles behind their creation may seem straightforward technologically, exploring them purely for defensive …

How to make a Keylogger Payload Undectatable Read More »