Blog

Hacking ≠ Exploitation — The True Hacker Mindset | Codelivly

Discover why hacking doesn't mean exploitation — learn the hacker mindset, differences between white/black/grey hats, and how curiosity improves security. You know the scene: a shadowy figure in a dark room, typing furiously as green code floods the screen. They're breaking into the "mainframe," causing...

Hardware Hacking: Tools, Attacks, Detection & Ethical Uses

Explore hardware hacking tools, common attacks, detection methods, and ethical applications — a practical guide for security pros and curious makers. Its history dates back to the 1970s and 1980s, when personal computing became more widespread and accessible. Today, hardware hacking has evolved into a...

Network Forensics 101: Tools, Techniques & Analysis

Learn network forensics basics, tools, techniques, log analysis & packet capture methods. Ideal guide for cybersecurity learners and incident responders. There are many systems that track and record network activities and data. However, there are still some measures that add up to the forensics on...

Metasploit for Ethical Pen-Testing: Secure & Harden Websites

Learn how security pros use Metasploit ethically — authorized pen-testing workflows, defensive checks, and website hardening steps to reduce real vulnerabilities. Normally, a penetration tester or hacker uses Metasploit to exploit vulnerable services in a target server or to create a payload to set up...

Threat Hunting — Practical Guide (Part 2) | Codelivly

Part 2 of "Hunt Evil": hands-on threat-hunting techniques, detection workflows, tools, and real case examples to help you find and remediate advanced network threats. As we discussed in the Part 1 , adversaries will come in many forms and will deploya wide variety of different...

Threat Hunting — Practical Guide (Part 1) | Codelivly

Part 1 of "Hunt Evil": foundational threat-hunting concepts, triage workflows, key data sources, and essential tools to start detecting advanced network threats You might have heard a lot of buzz around this topic of “Threat Hunting” and want to try your hand at proactive detection....

Chinese Hackers & AI Agents Target Cloud & Telecom

A Investigative report on Chinese-linked hacking groups and autonomous AI agents targeting global cloud and telecom infrastructure — tactics, impact, and mitigation. A series of new reports from leading cybersecurity firms paints a concerning picture of the evolving digital threat landscape. Nation-state hackers from China...

Level Up Your SOC Skills: A Deep Dive into The SOC Playbook

In today’s world, cyber threats are everywhere — and they’re getting smarter every day. That’s where a Security Operations Center (SOC) comes in. Think of it as the central command room for defending against hackers, malware, and all kinds of digital trouble. If you’re working...

A Practical Guide to Honeypots

In this section, we describe Network Intrusion Detection Systems (IDS)—the traditional approach to network security.We also introduce honeypots, providing a brief history of their development. Finally, we discuss the general advantages and disadvantages of honeypots in modern cybersecurity. 1.1 Network Intrusion Detection System The goal...

How to Make a Professional Honeypot to Defend Your Network

In cybersecurity, a honeypot isn’t a jar of honey – it’s a decoy system designed to lure in attackers. It mimics a vulnerable server or service, appearing as a juicy target (like an open SSH or database) while actually being isolated and closely monitored. Any...

The Real Pentesting Starter Pack: No Fluff, Just Labs and Grind

Ready to dive into pentesting? Forget the theory overload – the real learning happens in your own beginner pentesting lab. Think of it as your personal, safe hacking playground on your computer. As one guide bluntly puts it, “nothing beats real, hands-on experience” – so...

The Pentester Playbook – Get Started To Hacking

When you hear the word “hacking,” you might picture someone in a hoodie typing away in the dark, breaking into banks or stealing data. But here’s the truth: not all hackers are bad — and hacking isn’t just for the movies anymore. In today’s world,...

Is it secure to use an MCP server?

The Model Context Protocol (MCP) is a convenient open protocol for linking large-scale language models (LLMs) with external data sources and tools. However, since anyone can create an MCP server and publish it on GitHub, there is a possibility that it may contain malicious code....

The Ethical Hacker’s Playbook for Hacking Web Servers

So you’re interested in cracking the code of how hackers navigate web servers like they own the place? Well, welcome to the dark side—of knowledge. It’s not a tutorial on rampaging; it’s your backstage pass to hacker thinking so you can outsmart ’em. It’s your...

Exploit Development Made Easy: Generating Payloads In Metasploit

When developing exploits, creating shellcode is a necessary step. Metasploit provides an easy way to generate payloads from within the msfconsole. When you select a specific payload, Metasploit automatically adds useful commands such as "generate", "pry", and "reload". Among these commands, "generate" is the key...