Quantum Entanglement: Programming with Correlated Qubits
Learn what quantum entanglement actually means for programmers. Understand correlated qubits through working code, discover why classical approaches …
Search through all posts and articles
Try searching with different keywords
Searching...
Learn what quantum entanglement actually means for programmers. Understand correlated qubits through working code, discover why classical approaches …
Learn quantum programming from scratch: no physics degree needed. Discover what qubits really are, how superposition works, and why you can't 'peek' …
Discover what complex numbers really represent - not just abstract math, but a practical tool for describing magnitude and direction in physics, …
Discover why I migrated my blog from WordPress to Hugo for faster performance, better SEO, and zero hosting costs. Learn how I preserved my SEO, …
Discovering effective tools for teaching money calculations can be transformative for both educators and students alike. As the creator of …
Ever found yourself wrestling with arrays in JavasScript, desperately trying to remove duplicates or perform complex data manipulations? I’ve …
Here’s the guide from cracking TryHackMe Hammer Challenge. This challenge is rated medium and needs some coding skills. Let’s go through …
Hey there, React developers! Ready to level up your TypeScript game? You’re in for a treat. In this post, we’re diving into 7 TypeScript …
TypeScript has revolutionized the way we write JavaScript, offering enhanced type safety and improved developer experience. While the language comes …
TypeScript has become an integral part of modern web development, offering robust type-checking and enhanced tooling. Among its powerful features, …
When Nepal introduced the new E-Passport system, it promised a less stressful application process for everyone. The expectation was that individuals …
Medusa is a lengthy machine from the platform HackMyVM despite being easy. The machine’s author is noname and I must pay respect to him for …
Kitty is a hard machine to root by avijneyam from the platform HackMyVM. The machine’s theme is cats as suggested by the name of the VM. To …
Arroutada is a medium-difficulty machine by RiJaba1 from the HackMyVM platform. Although the author has marked this machine as easy, I don’t …
Ephemeral is a difficult machine involving various tricks and techniques to get to the root shell. However, it took some time for me as one of the …
Moosage is an easy machine by sml from the platform HackMyVM. The machine features an insecure file upload vulnerability in a blog application. Then, …
Eighty is a difficult machine from sML on the platform HackMyVM. This machine uses various techniques like knocking the ports out, analyzing the …
HackMyVM has added a new medium-difficulty machine “Catland” by cromiphi. This machine features subdomain enumeration, local file …
Light is an easy machine from the platform HackMyVM by sML. This machine requires knowledge of basic Linux and penetration testing. It could be really …
By far, Troya is one of my favourite VMs from the HackMyVM platform. The creator of the machines is sML and he has categorized this as a medium …
The first machine on the platform HackMyVM is a very easy machine authored by the user smL. This machine simply features basic enumeration and …
HackMyVM has come up with a new vulnerable machine whose author is cromiphi. The machine is of medium difficulty; although you can consider it hard …
Opacity is a new machine from the platform HackMyVM. The author of the VM is mindsflee. The VM includes vulnerabilities like insecure file upload, …
Developing a secure system requires robust authentication and authorization implementation. While authenticating users might not take much effort, the …
In the previous post about mixpanel, I gave a brief introduction about what analytics is and how to integrate mixpanel with react native. I will do …
It’s essential to have analytics in your app if you need help with your product decision. Not only does it give us an insight into how users are …
A while back, I wrote a post about feature toggle management using Unleash. However, on exploring more about managing features, I came to know about …
Dejavu is an easy machine from HackMyVM by the user InfayerTS. The machine includes basic vulnerabilities. First of all, we find a path from a …
“Decode” is an easy machine from HackMyVM by the user avijneyam. This machine requires some common sense to gather information. The …
Pingme is a new machine from HackMyVM by a friend rpj7. This machine is actually very nice if you try the intended way to get the shell. There is …
“Blog” is an easy machine from HackMyVM by d4t4s3c. If you have done many machines, this is a piece of cake. If you are new, I definitely …
If you are just starting into pentesting or if you are an expert in it, you should definitely know about HackMyVM. HackMyVM is a platform created by …
University is an easy machine from the HackMyVM platform. The author of the machine is SML. The machine’s main exploit is insecure file upload …
In the realm of modern project development, you often find yourself immersed in intricate scenarios. Picture this: you’re in the midst of a …
Preload is an easy machine by my friend avijneyam from the HackMyVM platform. There are only two exploits one need to understand to get to theinitial …
Area51 is an easy machine built on the recent 0-day vulnerability of the Log4j utility. This is one of the vulnerabilities that had a lot of impacts …
Earth is a CTF machine from Vulnhub created by SirFlash. This is the third machine from his series “The Planets” and the previous machine …
OTP is a difficult machine by the user avijneyam in the HackMyVM platform. By that, I mean there are many steps that one needs to perform to get to …
Venus is the first lab from the HackMyVM platform. This is a CTF that consists of 50 flags and a few hidden too. At the time of writing, the lab is a …
Government is a moderately difficult machine from the HackMyVM platform. The creator of the machine is 0xJin. There are a lot of unnecessary things …
Serve is an easy machine from the HackMyVM platform by d4t4s3c. It’s a bit tricky to get the foothold but the remaining steps are pretty easy. …
Isengard is an easy machine from HackMyVM by bit. It works well on VirtualBox. As for the machine, we can get into the machine by using Remote Command …
Hi! Welcome to my writeup of a new machine from HackMyVM. “Stagiaire” is a hard machine by cromiphi. This is a very good machine and is …
Hola! Family2 is a very easy machine from HackMyVM. This is quite straightforward and no bruteforcing is required on this machine. As for the machine, …
Hi! In this post, I am going to show you the steps for boot-to-root TheFool. It is a hard machine by SML from the HackMyVM platform. However, it …
Confusion is an easy machine by avijneyam from the HackMyVM platform. I like this machine personally. Also, it works quite well on VirtualBox. The …
Method is an easy machine by avijneyam from the HackMyVM platform. This machine requires a bit of enumeration and understanding of web technology. …
Greetings! Welcome to the write-up of the new machine Breakout by icex64 from the HackMyVM platform. This is fairly easy to root and doesn’t …
Tom is an easy machine from HackMyVM by d4t4s3c. This has a few vulnerabilities including LFI to RCE. Likewise, there are some binaries that would …
Again is an easy machine from HackMyVM by SML. Here, the author has marked the machine as hard but this is quite easy if we understand the code. This …
Demons is a good machine from HackMyVM by b4el7d. The creator has rated this machine as an easy one. However, I found this a bit challenging as I had …
A few months ago, I wanted to play with a machine that had many techniques involved. Luckily, I stumbled upon “Finding My Friend” by the …
Texte by SML is a recent addition to the HackMyVM platform. This machine is moderately difficult or easy depending on the experience of the player. …
Lupinone is an easy machine from HackMyVM by icex64. A bit of logic and experience helps to get the foothold. Once we get the foothold, it is a piece …
Hat is a great machine from HackMyVM by d4t4s3c. The machine is not straightforward and one has to think laterally. Also, this includes techniques and …
Tranquil is a moderately difficult machine from HackMyVM by SML. The best part of this machine is to get the foothold. After this, there is a file …
Bellatrix is the second vulnerable machine from the series Hogwarts in Vulnhub. The series is based on the movie/book series Harry Potter. Likewise, …
Dobby is the first machine from the series Hogwarts in Vulnhub by BLY. As the name suggests, this machine is based on the popular series Harry Potter …
After doing so many new machines from Vulnhub, I thought why now try great old machines too. I stumbled upon machines by DCAU who is also a …
Five86-2 is the second machine from the series Five86 by DCAU. If you haven’t read the writeup, I request you do so. Like the previous machine, …
Beelzebub is an easy machine from Vulnhub. This machine requires careful observation of everything. Talking about the machine, I have tested this on …
Suidy by SML is an easy machine from the HackMyVM platform. The machine works on VirtualBox. As the name suggests, the machine has a vulnerability …
Black Widow is a hard machine from Vulnhub and HackMyVM. This machine works on VirtualBox and you must take a snapshot so that it’s easy to …
Hundred is an easy machine from HackMyVM. The author of the machine is SML and he created it to celebrate 100 machines on the platform. The machine is …
DoubleTrouble is a recent addition to HackMyVM and Vulnhub. The author is tasiyanci and this machine is as good as his others. The machine works on …
The digitalworld.local Fall is an easy machine from Vulnhub by Donavan. Although there is a lot of information in the machine, the machine is too easy …
We have heard of ARP spoofing for a long time in various forms. For instance, I learned about this during my bachelor’s in computer engineer …
Deathnote is an easy machine from vulnhub and is based on the anime “Deathnote”. Furthermore, this is quite a straightforward machine. …
Vikings is a very nice CTF machine to practise. Although this is straightforward, this is slightly difficult for people who don’t have enough …
DarkHole 2 is an easy to medium machine from Vulnhub. However, the author has rated this as a hard machine. So, this difficulty depends on your …
Connection is an easy machine from HackMyVM. I recommend this to beginners. This machine works on VirtualBox. “Connection - Writeup - HackMyVM - …
Gift from HackMyVM is the simplest machine from HackMyVM. This already has an official write-up from the author. However, I am going to use different …
Titan is a hard machine by SML from HackMyVM. This machine is one of the great machines but easy if you are familiar with steganography and basic …
Bah is an easy machine from HackMyVm by SML. This machine works on VirtualBox. We get to learn basic concepts of pentesting from this machine. …
EvilBox is a Vulnhub machine rated as easy by the author Mowree. I have tried this machine on VirtualBox and it works fine on the default setting. …
Doc by SML is an easy machine from HackMyVM. This is easy to get the user’s shell and is tricky to get the root. I have tested this machine on …
Hacker Kid is a very good machine from Vulnhub. This includes different techniques that we can utilize to get to the root shell of the target. This …
Looz is an easy machine that requires a bruteforcing password for a user. I personally am not a fan of machines that incorporate this technique. …
Chronos is an easy/medium machine from Vulnhub by AL1ENUM. This machine is quite different from the usual easy machines. Also, I have tested this …
Thoth Tech is one of the easy machines from Vulnhub. Unless you are doing machines for the first time, you can definitely pawn this target. As usual, …
Hacksudo Thor is a basic machine from Vulnhub. This is probably the easiest machine from the hacksudo series that I recommend to beginners. And, I …
“Hack Me Please” is an easy machine from Vulnhub. I would like to thank Saket Sourav for this. Also, I have tried this machine in VMWare …
Hackademic is one of the old machines from Vulnhub. This is an easy machine and so I am going to explain all steps to get to the root. And, this …
Corrosion in a new machine in Vulnhub by Proxy Programmer. The author rates this machine as easy and so do I. However, if you don’t have enough …
DarkHole is an easy machine from Vulnhub. And, this machine works on VMWare. As I said, this machine is an easy machine for me, but it’s tricky …
HMS is an easy machine from Vulnhub by Nivek. Since this is a new machine in Vulnhub, I would like you to try it on your own first. And, I have tested …
Funbox ScriptKiddie is probably the easiest machine to crack. However, the machine is quite good at distracting our minds. So, if you haven’t …
We now have a new machine under the Funbox series, “Under Construction”. This machine is quite easy to gain root access. Also, this is a …
Hackable III is an easy machine depending on your experience of doing CTF challenges. Here, I have done the intended way of exploitation of the …
Jetty is an easy machine from Vulnhub. However, the description says that it’s medium up to getting the root flag. Next, we also have to find …
BlueSky is an easy machine from Vulnhub that requires a bit of initial enumeration. However, upon getting the foothold, this machine isn’t that …
Chill Hack is an easy machine from Vulnhub. The machine requires basic enumeration but involves bruteforcing, steganography, ssh tunnelling, etc. …
Y0usef is an easy machine from Vulnhub. This requires a bit of enumeration at the beginning. However, upon getting the foothold, it’s relatively …
BassamCTF is an easy machine from Vulnhub. However, it requires a bit of enumeration that are straightforward. “BassamCTF Walkthrough - Vulnhub …
Gaara by 0xJin is an easy machine from Vulnhub. However, there are some rabbit holes alongside. Also, I have tested this machine on VirtualBox. …
The Office: Doomsday Device is a Vulnhub machine based on the US version of the British mockumentary “The Office”. There are 8 flags on …
ICMP is an easy machine from Vulnhub by foxlox. Here, I will be explaining the important steps only. However, I will be avoiding simple commands to …
Double is an easy machine from Vulnhub by foxlox. I tested the machine in VirtualBox. Here, I won’t be explaining simple steps like listing …
XPTO System is an easy machine from Vulnhub by André Henrique. It didn’t work on my VirtualBox but VMWare. Here, I will not be explaining the …
Nasef1: Locating Target is an easy machine from Vulnhub by Nasef1. I will be skipping basic commands like cat, ls, etc. from this walkthrough. …
Insomnia is an easy machine from Vulnhub by alienum. We have to understand LFI, RCE, sudo abuse and cron job abuse to get to the root machine. Here, I …
Adroit is another great machine by AL1ENUM in vulnhub. The machine requires knowledge of java programs, SQL injection and basic enumeration …
Dragon Ball is an easy and quite straightforward machine from Vulnhub. This machine requires simple enumeration techniques and a bit of steganography. …
R-Temis is an easy machine from Vulnhub by RootNik Labs. Also, the author has forgotten to do something that would have been better for root privilege …
MoneyBox is an easy machine from Vulnhub. If you haven’t tried it yet, I suggest you do so. “MoneyBox Walkthrough - Vulnhub - …
System Failure is a medium machine from Vulnhub by the author 0xJin. This machine requires a bit of knowledge of sysadmin. However, the author of the …
Although the machine has the label “medium” in Vulnhub, Alfa is an easy machine. I would like to thank the author of the machine d4t4s3c …
Orasi from Vulnhub is a hard machine to do as per the author. However, depending on your likings, you might find it mediumly challenging. Anyway, …
Crossroads is an easy/medium machine by the author tasiyanci, a fan of blues like me. And, I am a big fan of crossroads and it gave me pleasure to do …
Gigachad is an easy machine from Vulnhub that doesn’t require many steps to get to the root access. However, one must do a close inspection on …
As the name suggests, NoobBox is an easy machine from vulnhub. However, this requires a bit of unusual enumeration at first. The author of the machine …
Coffee Addicts by BadByte is an easy machine from Vulnhub. A little of bit guessing and enumeration gets you the root. “Coffee Addicts …
Funbox 1 is an easy machine from Vulnhub that can be root within an hour. However, the exploit to get the root is quite interesting. If you …
Cereal is a machine that has a vulnerability of insecure deserialization in PHP. Also, we must enumerate the machine properly. Otherwise, we might not …
Funbox Gaokao is a machine that the author has intended for beginners. This machine needs a bit of brute force and some knowledge of the FTP protocol. …
netcat is a tool that allows us to read from and writing to network connections using TCP or UDP. Hence, this tool has come in handy whether we want …
Funbox: Lunchbreaker is one of the machines from the Funbox series. It’s a series about cracking passwords only. I personally don’t prefer …
In this post, I am going to do the third machine of Hacksudo series from Vulnhub. Hacksudo is one of the best series that I have done from Vulnhub. …
Monitors is an active machine from hackthebox. So, unless you are extremely desperate to capture the flag, don’t proceed to the walkthrough. …
Knife is an active machine from hackthebox. So, only come here if you are too desperate. “Knife Walkthrough - Hackthebox - Writeup” Note: …
Spectra is an active machine from hackthebox. Unless you are about to choke, I suggest you to take it on your own. Anyways, let’s move to the …
The first machine from the hacksudo series is an easy/medium machine from the series. Since the first version of this machine had a loophole that the …
Hacksudo 2 machine is an easy machine targeted towards misconfiguration of NFS. Likewise, it has the local file inclusion vulnerability that gives us …
Momentum 2 is an easy machine from vulnhub. This is the second machine in the series by AL1ENUM. “Momentum 2 Walkthrough - Vulnhub - …
Hackable II is an easy machine that everyone can root. So, I am doing this walkthrough if you are stuck somehow. Also, I am trying this machine on …
There is a new beginner level CTF challenge in Vulnhub. The author of the machine is Somu Sen. Also, I am trying the machine on the VMWare Workstation …
The machine is an easy to medium machine from Vulnhub for the CTF challenge by Vishal Waghmare. So, welcome to Hacksudo ProximaCentauri Walkthrough - …
Cap is an active machine during the time of writing this post. So, unless you are about to die, I suggest not to proceed. The machine is fairly simple …
At the time of writing this post, the machine was in active list. So, only proceed if you have tried on your own. Welcome to “The Notebook …
Have you ever got a call from an Indian guy with a very bad accent, Mark or John regarding a purchase refund? If so, then this is a time to take …
Welcome to another OSCP like challenge Venom from Vulnhub. This machine requires a bit of enumeration to get the foothold. Otherwise, it’s an …
Ripper from Vulnhub is an easy/medium machine depending on how the user takes it. Firstly, I would like to thank the author of the machine, Sanjay …
VulnCMS Walkthrough - Vulnhub - Writeup. The machine VulnCMS is an easy machine to root. Also, it takes some time to enumerate which is fairly easy. …
The machine Wireless from Vulnhub by Patel Kunal is a difficult machine that requires a lengthy process to reach the root user. However, I will be …
Welcome to ColddWorld Immersion Walkthrough - Vulnhub - Writeup. The machine is an easy machine to complete the boot to root challenge. Link to the …
The machine Phineas from Vulnhub by calfcrusher is an easy/medium machine to play with. So, let’s start with today’s topic “Phineas …
In this post, I will be doing the walkthrough of the vulnhub machine Blogger 1. Please follow this writeup till the end to boot to root. Also, this …
I intend to write this post Bluesmoke Devrandom2 Walkthrough - Writeup to explain all the steps that I did to root the machine from Vulnhub. First of …
Welcome to the walkthrough/writeup of Bluemoon 2021 from Vulnhub. Here, I will explain all the necessary steps to boot the machine to root. Link to …
I am going to do a walkthrough of Hacksudo Aliens from Vulnhub by Vishal Waghmare. This is a beginner friendly machine and should be fun as previous …
In this post, I am going to do the walkthrough of the machine AdmX 1.0.1 from Vulnhub. I intend to write this writeup for those who have intermediate …
I am going to do a walkthrough of the machine Wayne Manor 1 by balkan from Vulnhub. Likewise, I will also explain important information in this …
This post, Prime (2021) 2: Walkthrough - Vulnhub - Writeup will describe the steps that I performed to root the machine by Suraj. However, I have to …
Shenron 3 is the last machine of the series from Vulnhub. I am going to do the walkthrough of it in the post. So, please view my writeup of other …
Shenron 1 machine is an easy machine from Vulnhub to learn. In this walkthrough, I will be explaining basic stuffs so that beginners would understand. …
I am doing the walkthrough of the second machine of the Shenron series from vulnhub. If you haven’t read the writeup of the first machine make …
In this post, I am going to do the walkthrough of a machine from Vulnhub called Hacksudo Search. In this writeup, I will be explaining all the steps …
I am going to do the walkthrough of fun machine from vulnhub in this post. The machine is pylington by Peter Ye. Link to Pylington 1: …
I am going to do the walkthrough of machine momentum 1 from vulnhub. This machine is pretty simple, however, I had a hard time getting the root flag. …
In this post, I am going to do the walkthrough of the machine hacksudo FOG from Vulnhub by Vishal Waghmare. Machine Link: …
I had done writeup or walkthrough of hacksudo FOG in the previous post. Likewise, I will be doing the same for hacksudo LPE in this post. However, a …
I am going to do the walkthrough of driftingblues7 from vulnhub in this blog post. Link to the machine: …
This is the last machine of the series driftingblues from vulnhub. Now, I will be doing walkthrough of this machine in this post. Check out our all …
We are going to look into an easy machine of Vulnhub, Driftingblues5. Also, we have completed four machines from the series. So, make sure you check …
I will be doing walkthrough of Driftingblues 6 machine from vulnhub. Make sure to check driftingblues 5 walkthrough. Vulnhub – Driftingblues 5 – …
We are going to exploit the driftingblues1 machine of Vulnhub. Our goal is to capture user and root flags. Also, make sure to check out the …
We will be doing driftingblues2 challenge from vulnhub in this post. Please check this link for the walkthrough of driftingblues 1. Foothold fping …
Previous machine walkthrough: Vulnhub – Driftingblues 2 – Walkthrough Link of this machine: https://www.vulnhub.com/entry/driftingblues-3,656/ …
We are going to do walkthrough of driftingblues4 machine of vulnhub. If you haven’t checked out previous walkthrough, make sure you do that. …
In the previous post, we found out three more Horcruxes totalling 5. In this machine, Fawkes, we will be dealing with some difficult challenge like …
In the first machine of the Harry Potter series, Aragog, we found out two of the eight Horcruxes. Nagini is the second machine of the series with …
Harry Potter is one of the greatest movie and book series for no doubt. On the other hand, the VulnHub series by Mansoor R is one of the best …
In the previous post, we bypassed the login using SQL injection. Now, we want to exploit the feature of the application to open a reverse shell. This …
In the previous post, we tried to identify the possible vulnerabilities of the target machine. In this post, we will be trying to exploit the system. …
In the previous post, we entered the target machine exploiting a vulnerability in mod_ssl. However, we want to find some other vulnerabilities as …
We completed the first level of the Kioptrix challenge. Now, we have got to enter the next level of it. So, the link of the Kioptrix Level 2 is …
In the previous post, we performed some scans using Nmap and noted down the results. Now, in this post, I will make use of other ways with the help of …
Introduction This blog post is intended for tech enthusiasts who want to learn how to hack. When I first started, I was rather confused. Therefore, I …
Scanning In the previous post, we set up the environment to start our first hacking. Now, in this post, we are actually going to start hack the image. …
In the post, https://nepcodex.com/2020/05/what-is-subnetting/, we talked about what subnetting is. Similarly, in the previous post, we understood …
In the previous post, we talked about the need for subnetting. However, our final purpose is to be able to perform subnetting based on some …
Let’s imagine that you are recently hired for a job of network engineer. Now, your major responsibility is to manage the network of your …
Before diving into callbacks, we have to understand that, in javascript, functions are first-class objects. As such, we can dynamically create, …
JSON stands for ‘JavaScript Object Notation’. We use JSON for storing and exchanging data between server and client (browser). However, …
In the previous post, we created an express.js application step by step. If you haven’t read that post, I suggest you do it because the basic …
In this post, we will learn how to create an express application with a database. Not only this, but also we will include a templating engine. For …
In the previous post, we saw some basic interesting facts in JavaScript. In the same way, we are going to view other interesting facts in this post. …
JavaScript, which was created to “make web pages alive”, is one of the feature-rich language. However, this scripting language has got …
JavaScript (ECMAScript) is one of the powerful scripting language which provides many features to developer. In the first place, it is the technology …
In the previous post, we implemented stacks, which is quite useful in real life. However, there is another data structure that we see everyday around …
In the previous post, we implemented linked list in C. In the same way, now we are going to implement stacks in c programming language by an example. …
Introduction Memory Allocation in C In this post, we will learn about the dynamic allocation of memory in C. Also, we should be able to understand the …
Before starting to implement linked list in C, let’s see what self-referential structures are. Also, you need to know about dynamic memory …
In the previous article, we looked briefly on what pointers are. Furthermore, we learnt a simple implementation of pointers. In this post, I would …
In the previous blog post, I wrote about the relationship between pointer and array. I suggest you reading that post before starting here because this …
As we all know, C is the first language that many programmers learn during their career in programming. One of the reasons why C programming is …
Introduction In this article, I would like to create a simple web app in GoLang (in short Go) programming language. Go is a statically typed, …
Introduction to Laravel Laravel - Is it a choice for web artisans? The official website of laravel says The PHP Framework For Web Artisans Laravel …
Important If you have already created your virtual environment and your django app, then you can skip first few sections. In this post, we are going …
Let’s create a todo app quickly Project Setup Create a directory where all your project files and environment exist. mkdir django-rest cd …
Let’s serialize our own models This is the continuation of part 1 of my tutorial series. So, if you haven’t viewed part 1 of the …
Introduction A step-wise-step guide to create frontend app in React, Redux, Router. React is a frontend library used to create Single Page Application …
Introduction Django is a python-based and open source full stack web programming framework. With a little knowledge of python, you can easily learn …