Search

Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec
Welcome back, aspiring cyberwarriors! In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging...
5 min read
321 views

Open-Source Intelligence(OSINT): Sherlock - The Ultimate Username Enumeration Tool
Welcome back, aspiring OSINT investigators! Social media platforms hold a wealth of personal and professional information, making them...
2 min read
2,331 views

Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2
Welcome back, aspiring cyberwarriors! During reconnaissance, our goal is to identify vulnerable services within our target’s network. To...
3 min read
989 views

VPN Hacking: How VPN's Work and How They Break Our Security
Welcome back, my aspiring cyberwarriors! In recent posts, I have emphasized the risks inherent in VPN's. Virtual Private Networks or...
34 min read
1,217 views

NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298
Welcome back, my aspiring cyberwarriors! Over the years, Microsoft Windows operating system, the world's most widely used OS, has been...
3 min read
3,800 views


Is Hacking IP Cameras Just for Voyeurs or Does it Have Strategic and National Security Implications?
Welcome back, my aspiring cyberwarriors! Hacking IP cameras has always had a bit of voyeuristic appeal to the aspiring cyberwarrior. Many...
3 min read
749 views

Bypassing Next Generation Firewalls with fragtunnel
Welcome back, my aspiring cyberwarriors! A firewall is a critical component of network security that acts as a barrier between trusted...
4 min read
4,088 views

Cyber Threat Intelligence: Malware Bazaar on the Frontlines of Threat Intelligence
Welcome back, aspiring cyberwarriors! In the complex realm of cybersecurity, professionals face a continuously evolving landscape of...
3 min read
510 views


Data Analytics for Cybersecurity, Part 1: Getting Started with R Programing Language for Cybersecurity Analytics
Welcome back, my aspiring cyberwarriors! As our digital world progresses toward a circumstance where data analytics and artificial...
5 min read
560 views

SCADA/ICS Hacking in Cyber Warfare: Hacking Gas Stations in Russia
Welcome back, aspiring cyberwarriors. As the war rages on, Russia's gas exports have taken on heightened significance. This resource is...
2 min read
2,333 views

Vulnerability Scanning with Nuclei: The High-Speed, Customizable Solution for Advanced Vulnerability Scanning
Welcome back, my aspiring cyberwarriors! Nuclei is an advanced, open-source vulnerability scanner that has gained significant popularity...
5 min read
1,693 views

The SQLite Database: The Ubiquitous Database that Few Understand
Welcome back, my aspiring cyberwarriors! While most IT and cybersecurity professionals are familiar with the big database management...
4 min read
766 views

Physical Security: Lock Picking Basics for Hackers
Welcome back, my aspiring cyberwarriors! Physical perimeter security is just a important as your IT perimeter security. If the hacker can...
6 min read
1,523 views

Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Welcome back my cyberwarriors! One of the key tasks for those defending a country's, institution's, or corporation's assets is to...
4 min read
2,283 views


Ransomware: Build Your Own Ransomware, Part 1
Welcome back, my aspiring cyberwarriors! Ransomware is rapidly becoming the most important form of malware afflicting our digital...
3 min read
65,543 views

Hacking the Cloud: Privilege Escalation in AWS
In the previous tutorial, we learned about cloud technologies and how to conduct data gathering. It's not always the case that the user...
3 min read
887 views

Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 min read
3,990 views

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
3 min read
5,671 views

Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Welcome back, my aspiring cyberwarriors! When attempting to hack/pentest a website, it can be extremely useful to get the parameters of...
3 min read
4,763 views

Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
3 min read
14,440 views