Muhammad Abdullahi

Muhammad Abdullahi

About

Muhammad Abdullahi, OSCP+, is an ethical hacker specializing in application and network security. He enjoys breaking into systems (legally) and teaching others to do the same. For any inquiries, feel free to reach out.

6

Tutorials

1330

Total Views

Published Tutorials

Dark Web vs Deep Web: What's the Actual Difference?
Open Source Intelligence (OSINT)
Dark Web vs Deep Web: What's the Actual Difference?

Confused about the dark web and deep web? You're not alone. Most people use these terms interchangeably, but they're completely …

6 min read
Read
Searching for a Trafficked Person Using Open Source Intelligence (OSINT)
Open Source Intelligence (OSINT)
Searching for a Trafficked Person Using Open Source Intelligence (OSINT)

Learn how Open Source Intelligence (OSINT) can be used to locate missing or trafficked persons by analyzing publicly available data …

12 min read
Read
How to Crack Locked PDFs
Ethical Hacking
303
How to Crack Locked PDFs

Learn how to crack password‑protected PDFs using pdfcrack. This concise guide covers PDF encryption basics, how pdfcrack approaches password cracking …

10 min read
Read
How to Hide Data in Plain Sight: Steganography Using Steghide
Digital Forensics
406
How to Hide Data in Plain Sight: Steganography Using Steghide

Learn to hide and retrieve data inside images and other files using steghide. This concise guide covers embedding/extraction, passphrase use, …

6 min read
Read
How to Perform a Wi-Fi Deauthentication Attack
Ethical Hacking Network Hacking
286
How to Perform a Wi-Fi Deauthentication Attack

Learn how Wi-Fi deauthentication attacks work and how targets can be forcibly disconnected from a network. This tutorial explains the …

10 min read
Read
How to Recover Deleted Files Using Foremost
Digital Forensics
300
How to Recover Deleted Files Using Foremost

Learn how to recover deleted files using Foremost, a powerful forensic tool for file carving. This guide walks you through …

6 min read
Read
Get a Free Chapter - Web Security with Python Book