What You’ll learn Here
Red Teaming
CTF Writeups
OSINT
Forensics
DIY Projects
Threat Hunting
Malware Analysis
Eat.
Sleep.
Hack.
Repeat.
Invent Your Shit
Courses
Learn with our awesome courses at iys academy
Offensive Hacking Cookbook Course
The Offensive Hacking Cookbook course is a cutting-edge penetration testing program that redefines offensive hacking training. Taught by an OSCP-certified instructor, this comprehensive course equips you with hands-on skills and knowledge to become a skilled ethical hacker.
In today’s hyper-connected world, our mobile phones are more than just communication tools—they’re...
In this article, we will look into Steganography, which is the “art of hiding” information...
In today’s digital landscape, the quest for anonymity has become a critical aspect of hacking culture....
In July 2024, Reputed Cybersecurity blog Bleeping Computer reported that how the latest version of WhatsApp...
In recent weeks, cybersecurity researchers at various companies spotted a new type of phishing attack...
In this walk through, we will be going through the Sync room from Vulnlab. This room is rated as Easy...
In this walk through, we will be going through the Media room from Vulnlab. This room is rated as Medium...
In this walk through, we will be going through the Hybrid (Chain) room from Vulnlab. This room is rated...
In this walk through, we will be going through the Feedback room from Vulnlab. This room is rated as...
How to hack Android Phone using Kali Linux
In today’s hyper-connected world, our mobile phones are more than just communication tools—they’re...
Steganography: Hiding secrets like Mr. Robot
In this article, we will look into Steganography, which is the “art of hiding” information...
How Hackers Become Anonymous While Hacking
In today’s digital landscape, the quest for anonymity has become a critical aspect of hacking culture....
PG - Blogger
In this walk through, we will be going through the Blogger room from Proving Grounds. This room is rated...
Hacking social media accounts with Zphisher
In this article, we are continuing our phishing course and going into the practical end of phishing....
Phishing 101 - The Basics
In this article, we are starting our new short course on Phishing. In our last articles, we explore the...
Social engineering 101 - Part 2
In the last part of Social Engineering 101, we went on a ride and learn about what social engineering...
Social Engineering 101 - Part 1
A man called a cellphone manufacturer and says, “Hey! This is Rick over Arlington Heights and I...
How to do SMS and Call bombing on scammers?
Have you ever encountered those scam calls, where they try to rip you by those shady lottery win announcements?...
Kali-whoami - Stay Anonymous while hacking
Hello and Welcome back, my aspiring hackers. How are you? Today, we will be learning, how we can be anonymous...