Süleyman ÇelikHow to bypass Windows 10 UAC with PythonIn May of 2017, discovered a vulnerability in Windows 10 that allows any command to be executed with a high level of privileges without…Apr 10, 2022Apr 10, 2022
Süleyman ÇelikVulnerability AssessmentVulnerability assessment plays a major role in providing security to any organization’s resources and infrastructure from various internal…Feb 26, 2022Feb 26, 2022
Süleyman ÇelikFootprinting a Target using BillCipherBillCipher is an information gathering tool for a Website or IP address. Using this tool, you can gather information such as DNS Lookup…Feb 13, 2022Feb 13, 2022
Süleyman ÇelikInformation Gathering using Ghost EyeGhost Eye is an information-gathering tool written in Python 3. To run, Ghost Eye only needs a domain or IP. Ghost Eye can work with any…Jan 16, 2022Jan 16, 2022
Süleyman ÇelikExploit the Android Platform through ADB using PhoneSploitAndroid Debug Bridge (ADB) is a versatile command-line tool that lets you communicate with a device. ADB facilitates a variety of device…Jan 2, 2022Jan 2, 2022
Süleyman ÇelikWireless AttacksThere are several different types of Wi-Fi attacks that attackers use to eavesdrop on wireless network connections in order to obtain…Dec 26, 2021Dec 26, 2021
Süleyman ÇelikPerform an Man-in-the-Middle (MITM) Attack using Cain & AbelAn attacker can obtain usernames and passwords using various techniques or by capturing data packets. By merely capturing enough packets…Dec 20, 2021Dec 20, 2021
Süleyman ÇelikWhat is Ripple20?Ripple20 is a series of 19 zero day vulnerabilities that affect hundreds of millions of devices, and were discovered by JSOF research labs…Dec 15, 2021Dec 15, 2021