Cihat YildizWhat to Know About DLL InjectionDLL Injection — What Need to Know·6 min read·Sep 1, 2023----
Cihat YildizCreating Custom Docker Base Images: Boost Security and EfficiencyIn the modern software development landscape, containerization has emerged as a key element in deploying applications consistently and…·2 min read·Apr 7, 2023----
Cihat YildizDocker Daemon Startup Issues on ARM-based MacsDocker has become an essential tool for developers, providing a convenient way to containerize and manage applications. However, as with…·2 min read·Mar 29, 2023----
Cihat YildizDefine A Custom Search Shortcut in Google ChromeIn this post, I want to share a simple trick that you can do a search on your custom platform such as Medium, confluence, WordPress, etc.·2 min read·Nov 14, 2022----
Cihat YildizWin32 System ProgrammingThis note was created in the “Windows System Programming” course that was given by “C and System programmers Accosiaion” in 2016. Kaan…27 min read·Aug 28, 2022----
Cihat YildizA Simple Solution for Secret ScanningSecret scanning is an essential process before application deployment. You need to check any information in the code, such as password…·2 min read·Aug 24, 2022----
Cihat YildizRoot me: Bash — System 1In this post, we solve one of the “Root me” challenges called “Bash — System 1”. We have a binary file with SUID bit and the C code to…·2 min read·Feb 21, 2022----
Cihat YildizinHackerSpotHack The Box Reversing — Impossible Password Walkthroughn this blog post, we will see the solution of a Hack-The-Box reversing challenge called “Impossible Password”. It's been a long time…·4 min read·Jan 11, 2022----
Cihat YildizinHackerSpotInitiating a Vulnerability Scan via Nexpose Rest-APIWith vulnerability scan tools you identify vulnerabilities in your infrastructure and applications. You can perform manual and automated…·6 min read·Dec 27, 2021----