Category: Uncategorized

  • 17 Network Pentest Repo’s

    This post is an expansive post on where to find some of the best network pentest repo’s. One of my all time favorite repo’s is hybrid-analysis.com. This tool is great for finding strings and hashes, and finding malware and compromised hosts that may be linked to other computer network’s or nation state APT’s. Network penetration…

  • Evolution of Passwords: Password Manager

    In the vast landscape of cybersecurity, passwords serve as the first line of defense against unauthorized access to sensitive information. This article explores the origins of passwords, the factors that contribute to their strength, and the pivotal role of password managers in enhancing digital security. We will delve into the evolution of password complexity, the…

  • Cobalt Strike Shellcode Payloads – Network Penetration Testing

    shellcode development in network penetration testing

  • Network Penetration Testing & Cobalt Strike

    Network penetration testing plays a crucial role in assessing the security of an organization’s digital infrastructure. In this comprehensive guide, we will explore the advanced capabilities of Cobalt Strike, a versatile tool often referred to as a “Swiss Army knife” for penetration testers. By understanding how Cobalt Strike works and incorporating practical examples, we aim…

  • Mitnick Security – A legend

    The name Kevin Mitnick conjures images of a prodigious hacker, a maestro of digital deception, whose exploits reverberated through the annals of cybersecurity in the 90’s – mitnick security. I recall downloading his books on limewire and other filesharing sites when I was only 14 years old. This was the time of 2600 mag, torrents,…