How to search Android apps in other countries
Android APK security analyzer
🔝 How to decode ASP.NET VIEWSTATE
New! "Learn Pentesting like a Pro!" for free Android app
Scientific Notation bug bypass AWS WAF protection
🔝 How to use Nuclei for vulnerability scanning
NIST best practices to prevent and mitigate ransomware attacks
How to download Windows legally for FREE for your pentesting labs or malware analysis
Note taking for the OSCP certification
10 RULES TO BECOME A GREAT PENTESTER
Interactsh: Open-Source OOB solution for SSRF, Blind SQLi, ... in Kali Linux
Hacking Android apps in Windows with Frida (Part I)
Best Burpsuite Pro plugins in 2021
How to disguise a covert channel with netcat like a harmless command
What is a Google Dork?
How to record your terminal💻 session on Linux🐧
How to convert a certificate from der to pem
How to setup a PHP file dropper without tools
Advanced buffer overflow exploit by Taeho Oh
Cracking passwords with John the Ripper
How to scan ports with netcat
How to set up CSIRT and SOC guide
Sysadmin tricks: Get an alert when users log in
Bypassing encryption by memory dumping💣 in a Linux Kernel 2.4 in 2004
How to fix Wordpress XML-RPC Cyberattacks
How to resolve an IP address in Windows
Useful calculators for CISOs & Risk Managers
Other useful tools for pentesters
Gadgets for Penetration Testing
How to run Faradaysec
How to customize the ZSH shell
What is an exploit?
What is a CTF?
What is a bug bounty?
What is a 0day (Zero Day)?
What is a blue team?