Thanks for ur support!
Recent posts
2 - Open-Source Intelligence (OSINT)
Collect Info about your Target: Images, Emails, Passwords, Usernames, Social Media and More
1 - Practical Ethical Hacker
Recon, Scans, Buffer Overflow, AD, Web exploitation and More
Practical Network Penetration Tester
My Review about the 5 courses of TCM: PEH, OSINT, External Pentest, Linux Privesc and Windows Privesc
7 - Metasploit & Ruby
Ruby > Python
6 - Wi-Fi Pentest
Traffic Analysis, Deautentication, Man-in-the-Middle, Wardriving and More
5 - Web App Security
XSS, SQLi, CSRF, Session Attacks and More
4 - Linux Security
About Linux: It's not OK, It's necessary! Peterson, Jordan.
3 - Powershell
Learn to reduce your footprint and evade defense mechanisms
2 - Network Security
Scans, Information Gathering, Vulnerabilities and more
1 - System Security
Low level stuff - Do not panic!
eLearnSecurity Certified Professional Penetration Tester
Here's my Review of the eCPPTv2 by INE
eLearnSecurity Junior Penetration Tester
Get your feet wet in Pentesting with eJPT from INE!