Sitemap

Pages

</a>

Mohamed Ayman Said Elshazly

</a>

Archive Layout with Content

</a>

Posts by Category (grid view)

</a>

Posts by Category

</a>

Certifications & Licenses

</a>

Posts by Collection (grid view)

</a>

Posts by Collection

</a>

Edge Case (grid view)

</a>

Edge Case

</a>

</a>

</a>

</a>

</a>

</a>

Markup (grid view)

</a>

Markup

</a>

Page Archive

</a>

Page Archive

</a>

Portfolio

</a>

Post Archive with Feature Rows

</a>

Quick-Start Guide

</a>

Search

</a>

Sitemap

</a>

Mohamed Ayman Elshazly

</a>

Posts by Tag (grid view)

</a>

Posts by Tag

</a>

Posts by Year (grid view)

</a>

Posts by Year

</a>

</a>

</a>

</a>

</a>

</a>

</a>

Posts

SOC336 - OLE Zero Click RCE

SOC336 - OLE Zero Click RCE - CVE-2025-21298

4 minute read

</a>

APT35 (Charming Kitten)

APT35 has been active since at least 2013 and is recognized for its sophisticated use of social engineering tactics.

7 minute read

</a>

SideWinder APT Groups

SideWinder APT Groups

9 minute read

</a>

ToddyCat APT Group

ToddyCat APT Group

5 minute read

</a>

FalconEye Challenge

FalconEye Blue Team Challenge

12 minute read

</a>

Post Exploitation Techniques & Defense

Post Exploitation Techniques & Defense

less than 1 minute read

</a>

eCIR - Effectively Using Splunk (Scenario 1)

eCIR - Effectively Using Splunk

9 minute read

</a>

Lab: Reflected XSS into a JavaScript string with angle brackets HTML encoded

Reflected Cross-Site Scripting (XSS)

1 minute read

</a>

Red Team Tools

The investigation case about FireEye red team tools. Try to find root cause of incident

3 minute read

</a>

Data Breach 01

Unraveling the Enigma of Company Data Sale and Unveiling the Cryptic Clue

3 minute read

</a>

SOC175 - PowerShell Found in Requested URL

This 0-day vulnerability (CVE-2022-41082) is being actively exploited in the wild.

3 minute read

</a>

SOC202 - FakeGPT Malicious Chrome Extension

SOC202 - FakeGPT Malicious Chrome Extension

6 minute read

</a>

Basic Packet Analysis Using Wireshark

We will walk you through the required skills and knowledge to perform a basic packet analysis using Wireshark

9 minute read

</a>

SOC145 - Ransomware Detected

SOC145 - Ransomware Detected

2 minute read

</a>

Introduction to SIEM Solution

An introduction to Security Information and Event Management.

9 minute read

</a>

CyberTalents Certified SOC Analyst 2023

Lesson 3: Introduction to Network Security Lesson 4: Network Security Tools

4 minute read

</a>

SOC146 - Phishing Mail Detected - Excel 4.0 Macros

SOC146 - Phishing Mail Detected - Excel 4.0 Macros

4 minute read

</a>

SOC173 - Follina 0-Day Detected

SOC173 - Follina 0-Day Detected

6 minute read

</a>

Recon-ng

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

5 minute read

</a>

SIEM 1

What do SOC Analysts need to know about SIEM?

8 minute read

</a>

CyberTalents Certified SOC Analyst Challenges

CyberTalents Blue Team Scholarship 2023

6 minute read

</a>

CyberTalents Certified SOC Analyst 2023

Lesson 1: Introduction to Cybersecurity Lesson 2: Introduction to SOC

10 minute read

</a>

Red Hat System Administration I Part 1

Red Hat System Administration I

7 minute read

</a>