top of page
Articles

Using PowerShell for Security Investigations
This guide outlines how to use PowerShell effectively for blue team security testing.
Mar 124 min read
20


Pentesting: Essential Techniques for Effective Security Testing
A comprehensive overview of pentesting, its phases, and commonly used tools to help you get started.
Oct 1, 20244 min read
75

Security Analyst Tools
A Security Operations Center (SOC) analyst uses a variety of tools to monitor, detect, analyze, and respond to cybersecurity threats.
Jun 9, 20244 min read
164


Google Dorks - Advanced Search
Explore what Google dorks are, how to use them effectively, and provide real-world examples for practical use.
Apr 22, 20233 min read
5,396

VulnHub Mr Robot Hacking Walkthrough 2
Vulnhub is an online platform that provides a variety of virtual machines designed to test and enhance your hacking skills.
Mar 22, 20233 min read
359


VulnHub Mr Robot Hacking Walkthrough 1
Vulnhub is an online platform that provides a variety of virtual machines designed to test and enhance your hacking skills.
Feb 28, 20233 min read
738


Nmap Guide (network mapper)
Nmap (Network Mapper) is a free and open-source tool for network exploration and security auditing. It can be used to discover hosts and...
Jan 16, 20233 min read
86
bottom of page