Security Researcher Security Researcher... I have to say, since the rise of Bug Bounties, The self-proclaimed title of Security Researcher has gotten less and less popular Here is something I realized years ago... A little background, at this time, I had used some tools, I had used BackTrack and then Kali, I have monitored trends … Continue reading Who are you?!
Category: Whitehat Hacking
DEFCON Safe Mode Lectures are already live!
Yay for knowledge. DEFCON SAFE MODE Lectures are already online!
Under Utilized Metasploit Modules #1
First entry in a new series! Under utilized metasploit modules for hackers and penetration testers!
Under Utilized Tools/Resources #22
22nd Entry of Under Utilized Tools/Resources!
Fun Hardware for Hackers and Penetration Testers #5
5th Entry of fun hardware for hackers and penetration testers!
Fun Hardware for Hackers and Penetration Testers #4
Fourth entry of Fun Hardware for Hackers and Penetration Testers! You don't want to miss this!
Under Utilized Tools/Resources #21
21st Entry of under utilized tools and resources!
Under Utilized Tools/Resources #20
20th entry of under utilized tools and resources for hackers, red teamers and penetration testers!
Under Utilized Tools/Resources #19
Next entry of under utilized tools/resources!
Under Utilized Tools/Resources #17
17th Entry of Under utilized tools and resources for hackers and penetration testers!










