Starting a career in cybersecurity can feel overwhelming with the vast array of specializations, tools, and concepts to master. This comprehensive guide provides a structured roadmap for beginners ...
Open Source Intelligence (OSINT) is the practice of collecting and analyzing publicly available information to produce actionable intelligence. This guide provides a structured methodology for cond...
Windows Privilege Escalation Techniques Privilege escalation is a critical phase in penetration testing where we attempt to gain higher-level permissions on a Windows system. This comprehensive gu...
Attacking AD (HTB) Initial Enumeration Command Description nslookup ns1.inlanefreight.com Used to query the domain name system and discover the IP...
Powershell Obsfucation tricks with examples Here is a list of obsfucation techniques. String encoding: This involves converting strings into a different format, such as base64 or hexadecimal, ...
To create a Python 3 virtual environment with a specific version of Python, follow these steps: Install the virtualenv package using pip: pip install virtualenv Create a new virtual environme...
Introduction This is a quick reference to getting started with Bash scripting. Learn bash in y minutes (learnxinyminutes.com) Bash Guide (mywiki.wooledge.org) Example #!/usr/bin/env bash ...
Burp + sqlmap Save a request in burp (right click > save to file) Run with sqlmap sqlmap -r sqlmap.txt --batch Generic -u "<URL>" -p "<PARAM TO TEST>" --user-agent=SQLMAP --r...
Oneliner commands for bug bounty xss + urls katana -u "https://pestphp.com/" | cariddi | dalfox pipe --proxy http://127.0.0.1:8080 | tee -a pest_test_urls.txt cat pest_test_urls.txt | egrep -iv ...
If you’re reading this, chances are you’re passionate about staying safe and secure online. In today’s world, cyber security is more important than ever. With so much of our lives taking place onli...
A new version of content is available.