sameer fakhoury
  • Home
  • CTF Writeups
  • Course Summaries
  • Cyber Reports
  • Articles
  • Event Notes
  • About Me
Articles

Articles

This page showcases articles I've authored on a range of tech topics, from artificial intelligence and cybersecurity to coding and beyond. So, grab a cup of coffee and dive with me into the depths of technology!

Tech Insights

Can AI Impersonate you from a Cyber Security perspective ??Can AI Impersonate you from a Cyber Security perspective ??
Can AI Impersonate you from a Cyber Security perspective ??
From Hunter to Hunted: The Clipboard's Hidden DangerFrom Hunter to Hunted: The Clipboard's Hidden Danger
From Hunter to Hunted: The Clipboard's Hidden Danger
The Chips N Crisp, unveiling the mysteries of chcpThe Chips N Crisp, unveiling the mysteries of chcp
The Chips N Crisp, unveiling the mysteries of chcp
ChatGPT's Dynamic Duo: The Double-Automation Tagging SystemChatGPT's Dynamic Duo: The Double-Automation Tagging System
ChatGPT's Dynamic Duo: The Double-Automation Tagging System
Notion & Mind Map: ChatGPT Tagging Repository ExtravaganzaNotion & Mind Map: ChatGPT Tagging Repository Extravaganza
Notion & Mind Map: ChatGPT Tagging Repository Extravaganza
Hacking Privileged Docker Containers: Capabilities ExploitationHacking Privileged Docker Containers: Capabilities Exploitation
Hacking Privileged Docker Containers: Capabilities Exploitation
Quick Assist, Quicker Hack: LOLBINs The Double-Edged Sword of CybersecurityQuick Assist, Quicker Hack: LOLBINs The Double-Edged Sword of Cybersecurity
Quick Assist, Quicker Hack: LOLBINs The Double-Edged Sword of Cybersecurity
Mathematical Foundations for Estimating Cracking Time in Password Creation MethodologyMathematical Foundations for Estimating Cracking Time in Password Creation Methodology
Mathematical Foundations for Estimating Cracking Time in Password Creation Methodology
Windows Forensics Unleashed: Automated Artifact Harvesting and Seamless Splunk Integration via Universal ForwardingWindows Forensics Unleashed: Automated Artifact Harvesting and Seamless Splunk Integration via Universal Forwarding
Windows Forensics Unleashed: Automated Artifact Harvesting and Seamless Splunk Integration via Universal Forwarding
Microsoft PME: Architecture, Workflow, and OSINT Insights from Metadata ExposureMicrosoft PME: Architecture, Workflow, and OSINT Insights from Metadata Exposure
Microsoft PME: Architecture, Workflow, and OSINT Insights from Metadata Exposure
Deep-Dive into Outlook Autodiscover: How Clients Locate, Authenticate, and Connect to Exchange in Domain and Non-Domain-Joined Devices and How to Defend Against Password Spray AttacksDeep-Dive into Outlook Autodiscover: How Clients Locate, Authenticate, and Connect to Exchange in Domain and Non-Domain-Joined Devices and How to Defend Against Password Spray Attacks
Deep-Dive into Outlook Autodiscover: How Clients Locate, Authenticate, and Connect to Exchange in Domain and Non-Domain-Joined Devices and How to Defend Against Password Spray Attacks
The Aura is Fading: The Human Cost of AI in Cybersecurity in 2026The Aura is Fading: The Human Cost of AI in Cybersecurity in 2026
The Aura is Fading: The Human Cost of AI in Cybersecurity in 2026

©sameer fakhoury

GitHubLinkedIn