Learn Pentesting like a Pro!
Subscribe
Sign in
Home
Archive
About
New
Top
🤖 Top 10 vulnerabilities for ChatGPT and LLM applications
New technologies introduce new and old vulnerabilities and threats
Aug 4
 •Â
DH
1
Share this post
🤖 Top 10 vulnerabilities for ChatGPT and LLM applications
pentesting.academy
Copy link
Facebook
Email
Notes
Other
March 2023
Path Traversal Cheat Sheet
List of useful paths to exploit path traversal in Windows and Linux
Mar 27
 •Â
DH
Share this post
Path Traversal Cheat Sheet
pentesting.academy
Copy link
Facebook
Email
Notes
Other
February 2023
Basic recommendations to avoid #ransomware attacks
CISA give us some guidance to avoid this raising trend: Preparing for Ransomware Maintain offline backups of data, and regularly test backup and…
Feb 28
 •Â
DH
2
Share this post
Basic recommendations to avoid #ransomware attacks
pentesting.academy
Copy link
Facebook
Email
Notes
Other
Apply this 10 rules to defend your Kubernetes cluster properly
Ten security recommendations to protect your Kubernetes deployment
Feb 20
 •Â
DH
Share this post
Apply this 10 rules to defend your Kubernetes cluster properly
pentesting.academy
Copy link
Facebook
Email
Notes
Other
Patch your VMware ESXi now!
Ransomware attacks are raising against ESXi infrastructure
Feb 13
 •Â
DH
Share this post
Patch your VMware ESXi now!
pentesting.academy
Copy link
Facebook
Email
Notes
Other
✅ Quick guide for password cracking
Learn different techniques to create custom wordlists from the content of a website and how to use John the Ripper or Hashcat to crack Windows or Linux…
Feb 8
 •Â
DH
2
Share this post
✅ Quick guide for password cracking
pentesting.academy
Copy link
Facebook
Email
Notes
Other
SSRF cheat sheet for AWS, GCP and Azure
In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker…
Feb 6
 •Â
DH
Share this post
SSRF cheat sheet for AWS, GCP and Azure
pentesting.academy
Copy link
Facebook
Email
Notes
Other
🥷 Top sites for passive reconnaissance
Passive reconnaissance is a critical step for bug bounties or penetration testing engagements, get ready!
Feb 3
 •Â
DH
Share this post
🥷 Top sites for passive reconnaissance
pentesting.academy
Copy link
Facebook
Email
Notes
Other
January 2023
Hacking Ethereum EVM: Get Txs & OPcodes basics
To grab big bounties in Web3 you rather get inside the Matrix =D
Jan 20
 •Â
DH
Share this post
Hacking Ethereum EVM: Get Txs & OPcodes basics
pentesting.academy
Copy link
Facebook
Email
Notes
Other
How to scan a host with RustScan
After using nmap and unicornscan for a while, RustScan is probably the fastest to scan TCP and UDP ports, learn how to use it
Jan 18
 •Â
DH
Share this post
How to scan a host with RustScan
pentesting.academy
Copy link
Facebook
Email
Notes
Other
Fuzzing with Radamsa in BlackArch
When looking for new vulnerabilities, fuzzing, is a great technique to crash apps with unexpected data, learn how to do it.
Jan 18
 •Â
DH
Share this post
Fuzzing with Radamsa in BlackArch
pentesting.academy
Copy link
Facebook
Email
Notes
Other
✅ Best commands for Port Scanning — For OSCP, pentests, bug bounties
Learn several techniques to scan hosts, bypass firewalls and scan the whole IPv4 universe.
Jan 13
 •Â
DH
2
Share this post
✅ Best commands for Port Scanning — For OSCP, pentests, bug bounties
pentesting.academy
Copy link
Facebook
Email
Notes
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts