PinnedPublished inInfoSec Write-upsTop 20 Linux Commands Every Pentester Should KnowAs a pentester (penetration tester), you’re often operating in Linux environments. Whether you’re navigating a compromised system…Apr 16Apr 16
PinnedPublished inCyber Security Write-upsHydra: Unveiling the Power of Brute Force in Web Page Login SecurityFeb 1, 2024A response icon4Feb 1, 2024A response icon4
PinnedPublished inInfoSec Write-ups5 Tools I Wish I Knew When I Started HackingAs I entered the world of hacking and cybersecurity, I was bombarded with the quantity of tools available. Each YouTube video, course, or…Mar 31A response icon1Mar 31A response icon1
Published inInfoSec Write-upsHakrawler Tutorial: Fast Web Crawler for Bug BountyWhether you’re interested in penetration testing, OSINT, or bug bounty, this quick and easy Golang-based crawler is an essential addition…Jun 12Jun 12
Published inInfoSec Write-upsToolHive Tutorial: Securely Deploy and Manage MCP ServersIn this blog, we’re delving into ToolHive, a small tool that makes managing and deploying MCP servers remarkably simple and safe. ToolHive…Jun 9Jun 9
Published inInfoSec Write-upsSecure Your Kubernetes Access with kubectl-rexec PluginHave you ever hopped inside a pod and swiftly debugged something using kubectl exec? It’s useful, but it has a big flaw: there is no audit…Jun 2Jun 2
Published inOSINT TeamProxyBlob: Create SOCKS Proxy via Azure Blob StorageHave you ever been in an environment where direct network access is blocked, but cloud services like Azure Blob Storage are still…May 30A response icon1May 30A response icon1
Published inInfoSec Write-upsAI-Powered SQLMap: Smarter SQL Injection Testing GuideSQLMap is a powerful open-source tool for finding and taking advantage of SQL injection vulnerabilities in web applications. If you’ve been…May 29May 29
Published inInfoSec Write-upsHow to Build a Secure Password Manager in PythonPassword management is one of the most critical activities for being secure online. But with several dozen (if not hundreds) of accounts…May 23A response icon1May 23A response icon1
Published inInfoSec Write-upsOnline Oversharing: Risks & Ethics You Need to KnowSharing is second nature to us. We share photos of our holidays, tweet our ideas, check in on our location, and blog about our lives all…May 21May 21