Skip to main content

Abhilash Nigam's Blog

Hello, everyone! Welcome to my personal blog.

In this blog, I will be writing about my projects (what I do/how I did), my personal experiences, and some random stuffs.

You can follow me on my social media and Github account.

Featured Posts

  • Posted on:  at 

    It’s been a while since I wrote a blog. This blog is to describe my journey of Pentester Academy's Certified Red Team Professional (CRTP) course. Few months back Offensive Security updated their PWK course. When I was going through the updated course content, I honestly felt that I made a mistake opting for PWK in 2019 and that I should have done it in 2020. The major changes in course material was the addition of Active Directory and PowerShell Empire modules. I wanted to gain better understanding of the Active Directory security so I took the course.

  • Posted on:  at 

    This post is part 1 of writing shellcode manually and eliminating msfvenom for the creation of reverse shellcode. While studying for this topic I did not find many blogs on Windows Reverse/Bind Shellcoding.

  • Posted on:  at 

    This post is part 2 of writing shellcode manually and eliminating msfvenom for the creation of reverse shellcode. While studying for this topic I did not find many blogs on Windows Reverse/Bind Shellcoding.

  • Posted on:  at 

    This post is part 1 of writing shellcode manually and eliminating msfvenom for the creation of reverse shellcode. While studying for this topic I did not find many blogs on Windows Reverse/Bind Shellcoding.

  • Posted on:  at 

    So it's been a few days now since I received my OSCP results and since then my inbox is a buzzing with all the query regarding OSCP. So, I thought why not write a blog about it like everybody else. This is not a OSCP Review.

All Posts

  • Posted on:  at 

    So in my last blog I showed you guys to set up the iOS devices to start your journey in testing iOS Applications. I have also written a simple script that will automatically do the job of installing basic packages on your iPhone and help you start your journey in testing iOS Applications, you can find it on my [Github](https://github.com/abhilashnigam/iOS-Phone-Setup). If you have not read my previous blog then you can read it on [ios-pentesing-guide-from-a-n00bs-perspective.1](https://abhilashnigam.nl/blog/posts/ios-pentesting).

  • Posted on:  at 

    Hello Guys, There are tons of blogs and resources available over the internet for helping you start your journey with Android Security Assessment but only a handful of resources will explain in detail how to start with iOS Security Assessment. This blog aims at helping you start iOS Security Assessment.

  • Posted on:  at 

    It’s been a while since I wrote a blog. This blog is to describe my journey of Pentester Academy's Certified Red Team Professional (CRTP) course. Few months back Offensive Security updated their PWK course. When I was going through the updated course content, I honestly felt that I made a mistake opting for PWK in 2019 and that I should have done it in 2020. The major changes in course material was the addition of Active Directory and PowerShell Empire modules. I wanted to gain better understanding of the Active Directory security so I took the course.

  • Posted on:  at 

    This post is part 1 of writing shellcode manually and eliminating msfvenom for the creation of reverse shellcode. While studying for this topic I did not find many blogs on Windows Reverse/Bind Shellcoding.

  • Posted on:  at 

    This post is part 2 of writing shellcode manually and eliminating msfvenom for the creation of reverse shellcode. While studying for this topic I did not find many blogs on Windows Reverse/Bind Shellcoding.

  • Posted on:  at 

    This post is part 1 of writing shellcode manually and eliminating msfvenom for the creation of reverse shellcode. While studying for this topic I did not find many blogs on Windows Reverse/Bind Shellcoding.

  • Posted on:  at 

    So it's been a few days now since I received my OSCP results and since then my inbox is a buzzing with all the query regarding OSCP. So, I thought why not write a blog about it like everybody else. This is not a OSCP Review.