0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


How to Break Up Outlook PST Files Easily: Complete Guide In today’s arena, digital communication has become more popular across the globe. Every individual or enterprises is using e-communication to share crucial information with the peoples or employees. Nowadays, email becomes an official way of communication between the peoples. The Microsoft Outlook is one of the most popular ...


Arpag - Automatic Exploit Tool arpag : In Turkish mythology magical word means. The tool name arpag has been selected because it has made the exploit process automatic. The Project has used Metasploit rc code and python requests module and python socket module. Installation: git clone https://github.com/anilbaranyelken/arpag.git cd arpagpip install -r requests Usage: arpag.py ...


GDPR - Let's do this... On May 25th, 2018 a new privacy law goes into effect across the European Union (EU). It is called GDPR or General Data Protection Regulation. Any company that does business in the EU is required to adhere to GDPR. As a cyber security company that has users all over the world, ...


Overview Objective : Get Flag Tools used : netdiscover, nmap, nikto, wireshark, hydra, scp, a brain OVA Link - Original Post To start, we'll get the IP of the tr0ll VM. I usually just use netdiscover as follows: Next, we can do a ...


New Cryptomix variant and extension [.WORK] -Ransomware, in general, uses the same way as its distribution method, the conventional way of using spam email. Spread by email is still very useful because there are still many people who are easily deceived by email tricks, this reason why cybercriminals always repeat the same method continuously. Changes in Ransomware WORK Cryptomix: ...


2.4 What to Protect Against - Cyber Threats Wikipedia updated list: 0–9 A B C ...


One important piece of advice I can give mac users is to invest in a good quality USB type-C hub for your MacBook Pro for better performance. In other words, if you have an amazing engine and a nice looking exterior, what good it is if the car doesn't have wheels/tires to go anywhere? More and more people are ...


Welcome, to any enthusiastic cybrarian viewing this.I am a high school senior and my entire senior project is based on the world of CTF. In the following article, I will be translating the first section of my senior project documentation for everyone interested in getting a better understanding of CTF. 1.1. Introduction CTF ...


What is this post about? In this post, I will show you how can you block all malware domain which hosts malicious code on their sites which can compromise your system or your browser by saving some bad cookies or malware on your computer, not only this it will also block ads and online tracking ...


Are you looking to bulk import MSG files to Outlook 2016, 2013, 2010, 2007, and below editions? Then, download best MSG to PST Converter to combine multiple MSG files to PST with attachments . In this article, you will get the complete solution to convert MSG to PST without Outlook. Before moving on, let us ...