Thanks for ur support!
Recent posts
1 - Encoding & Filtering
Filtering with Regex, Types of encoding, Bypass WAF and More
Web application Penetration Tester eXtreme
My Review of the eWPTXv2 by INE
6 - Movement, Pivoting and Persistence
Lateral Movement, Pivoting and Persistence using the C2 Covenant and Metasploit
5 - Windows Privilege Escalation
Navigating Windows Privesc Techniques: Kernel Exploits, Impersonation, Registry, DLL Hijacking and More
4 - Linux Privilege Escalation
Exploring Linux Privesc Techniques: Kernel Exploits, SUDO, SUID, Scheduled Tasks, NFS Root Squashing and More
3 - External Pentest Playbook
The full life cycle of an External Pentest: ROE, Osint, Attacking Login Portals, Report, Client Debriefs and More
2 - Open-Source Intelligence (OSINT)
Collect Info about your Target: Images, Emails, Passwords, Usernames, Social Media and More
1 - Practical Ethical Hacker
Recon, Scans, Buffer Overflow, AD, Web exploitation and More
Practical Network Penetration Tester
My Review about the 5 courses of TCM: PEH, OSINT, External Pentest, Linux Privesc and Windows Privesc
7 - Metasploit & Ruby
Ruby > Python
6 - Wi-Fi Pentest
Traffic Analysis, Deautentication, Man-in-the-Middle, Wardriving and More
5 - Web App Security
XSS, SQLi, CSRF, Session Attacks and More
4 - Linux Security
About Linux: It's not OK, It's necessary! Peterson, Jordan.
3 - Powershell
Learn to reduce your footprint and evade defense mechanisms
2 - Network Security
Scans, Information Gathering, Vulnerabilities and more