Operations security (OpSec) is UBER important. Whether you're on the blue, red, purple team. Whether you wear a white, gray or black hat!
Tag: Ethical Hacking
Who are you?!
Security Researcher Security Researcher... I have to say, since the rise of Bug Bounties, The self-proclaimed title of Security Researcher has gotten less and less popular Here is something I realized years ago... A little background, at this time, I had used some tools, I had used BackTrack and then Kali, I have monitored trends … Continue reading Who are you?!
DEFCON Safe Mode Lectures are already live!
Yay for knowledge. DEFCON SAFE MODE Lectures are already online!
Complete CloudGoat Setup Guide
A complete tutorial for setting up CloudGoat using Windows 10 and Virtual Box (Ubuntu Server 20.04 LTS)
Generating a MSF Reverse Shell For the USB Rubber Ducky Kali Tips #9
9th Entry of the Kali Tips Series!
Under Utilized Metasploit Modules #1
First entry in a new series! Under utilized metasploit modules for hackers and penetration testers!
Under Utilized Tools/Resources #22
22nd Entry of Under Utilized Tools/Resources!
Fun Hardware for Hackers and Penetration Testers #5
5th Entry of fun hardware for hackers and penetration testers!
Fun Hardware for Hackers and Penetration Testers #4
Fourth entry of Fun Hardware for Hackers and Penetration Testers! You don't want to miss this!
Under Utilized Tools/Resources #21
21st Entry of under utilized tools and resources!