Thanks for ur support!

Buy Me a Coffee

Recent posts

1 - Encoding & Filtering

Filtering with Regex, Types of encoding, Bypass WAF and More

8 minute read

Web application Penetration Tester eXtreme

My Review of the eWPTXv2 by INE

less than 1 minute read

6 - Movement, Pivoting and Persistence

Lateral Movement, Pivoting and Persistence using the C2 Covenant and Metasploit

24 minute read

5 - Windows Privilege Escalation

Navigating Windows Privesc Techniques: Kernel Exploits, Impersonation, Registry, DLL Hijacking and More

15 minute read

4 - Linux Privilege Escalation

Exploring Linux Privesc Techniques: Kernel Exploits, SUDO, SUID, Scheduled Tasks, NFS Root Squashing and More

7 minute read

3 - External Pentest Playbook

The full life cycle of an External Pentest: ROE, Osint, Attacking Login Portals, Report, Client Debriefs and More

7 minute read

2 - Open-Source Intelligence (OSINT)

Collect Info about your Target: Images, Emails, Passwords, Usernames, Social Media and More

5 minute read

1 - Practical Ethical Hacker

Recon, Scans, Buffer Overflow, AD, Web exploitation and More

29 minute read

Practical Network Penetration Tester

My Review about the 5 courses of TCM: PEH, OSINT, External Pentest, Linux Privesc and Windows Privesc

less than 1 minute read

7 - Metasploit & Ruby

Ruby > Python

110 minute read

6 - Wi-Fi Pentest

Traffic Analysis, Deautentication, Man-in-the-Middle, Wardriving and More

45 minute read

5 - Web App Security

XSS, SQLi, CSRF, Session Attacks and More

100 minute read

4 - Linux Security

About Linux: It's not OK, It's necessary! Peterson, Jordan.

54 minute read

3 - Powershell

Learn to reduce your footprint and evade defense mechanisms

27 minute read

2 - Network Security

Scans, Information Gathering, Vulnerabilities and more

121 minute read