Open in app

Sign in

Medium Logo
Write

Sign in

Motasem Hamdan
Motasem Hamdan

628 followers

Home

About

HTB Certified Active Directory Pentesting Expert (HTB CAPE) Study Notes & Guide

What is HTB Certified Active Directory Pentesting Expert (CAPE)

12h ago
HTB Certified Active Directory Pentesting Expert (HTB CAPE) Study Notes & Guide
HTB Certified Active Directory Pentesting Expert (HTB CAPE) Study Notes & Guide
12h ago

How to Analyze Ransomware with ANY.RUN & Ghidra

Overview of Mamuna Ransomware

2d ago
How to Analyze Ransomware with ANY.RUN & Ghidra
How to Analyze Ransomware with ANY.RUN & Ghidra
2d ago

Chrome Extensions Can Hack You | Cyber Defenders FakeGPT Walkthrough

The article explains that Chrome extensions are composed of six main parts: the manifest file, background scripts, content scripts, popup…

5d ago
Chrome Extensions Can Hack You | Cyber Defenders FakeGPT Walkthrough
Chrome Extensions Can Hack You | Cyber Defenders FakeGPT Walkthrough
5d ago

How is AI affecting employment & Your Job? Examining its role in cybersecurity and automation.

This article explores how artificial intelligence (AI) is transforming the employment landscape, particularly within cybersecurity and…

6d ago
How is AI affecting employment & Your Job? Examining its role in cybersecurity and automation.
How is AI affecting employment & Your Job? Examining its role in cybersecurity and automation.
6d ago

How to Use Nmap | TryHackMe Nmap: The Basics

Introduction

May 9
How to Use Nmap | TryHackMe Nmap: The Basics
How to Use Nmap | TryHackMe Nmap: The Basics
May 9

TryHackMe Networking Secure Protocols Writeup

This write-up offers a comprehensive walkthrough of TryHackMe’s “Networking Secure Protocols” room, focusing on securing network…

May 9
TryHackMe Networking Secure Protocols Writeup
TryHackMe Networking Secure Protocols Writeup
May 9

SOC Case Study | Phishing Analysis | SOC282

In this article, we take on the role of a SOC (Security Operations Center) analyst, analyzing a phishing alert related to a deceptive email…

May 6
SOC Case Study | Phishing Analysis | SOC282
SOC Case Study | Phishing Analysis | SOC282
May 6

Certified Ethical Hacker Study Notes & Practice Tests

Introduction to Certified Ethical Hacker Certification

May 4
Certified Ethical Hacker Study Notes & Practice Tests
Certified Ethical Hacker Study Notes & Practice Tests
May 4

Hacking WordPress Plugins | TryHackMe Smol

Hackers can compromise WordPress sites without knowing admin credentials by exploiting vulnerable plugins. WordPress heavily relies on…

Apr 28
Hacking WordPress Plugins | TryHackMe Smol
Hacking WordPress Plugins | TryHackMe Smol
Apr 28

Cryptography Free Course | Cryptography For Cyber Security

This article kicks things off by explaining that this isn’t a deep dive or an advanced cryptography course or class. It’s more of a…

Apr 21
Cryptography Free Course | Cryptography For Cyber Security
Cryptography Free Course | Cryptography For Cyber Security
Apr 21
Motasem Hamdan

Motasem Hamdan

628 followers

Motasem Hamdan is a content creator and swimmer who creates cyber security training videos and articles. https://www.youtube.com/@MotasemHamdan

Following
  • Arabic Note | تغريدات عربية

    Arabic Note | تغريدات عربية

  • Pentester Academy

    Pentester Academy

  • InfoSec Write-ups

    InfoSec Write-ups

  • Microsoft Design

    Microsoft Design

  • Stéphane Torregrosa

    Stéphane Torregrosa

See all (11)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech