Sitemap - 2023 - Learn Pentesting like a Pro!
Basic recommendations to avoid #ransomware attacks
Apply this 10 rules to defend your Kubernetes cluster properly
✅ Quick guide for password cracking
SSRF cheat sheet for AWS, GCP and Azure
🥷 Top sites for passive reconnaissance
Top 10 smart contract vulnerabilities on Ethereum
Hacking Ethereum EVM: Get Txs & OPcodes basics
How to scan a host with RustScan
Fuzzing with Radamsa in BlackArch
✅ Best commands for Port Scanning — For OSCP, pentests, bug bounties
🥷 Brute-force attacks Cheat Sheet (FTP, POP3, SNMP, SSH, VNC, …)
🧮 How to perform dynamic analysis of a smart contract with Myth
🧮 How to use solium (Ethlint) to audit smart contracts
🧮 How to use slither to audit smart contracts
🥷 Cracking the OSCP certification: 15 tools for Pivoting and Lateral Movement
🥷 Enumeration Cheat Sheet for the 25 most used protocols: From DNS to ElasticSearch
🥷 The Art of Pentesting: Post-exploitation like an APT
✅ 17 techniques for Privilege Escalation in Windows and Linux
🥷Msfvenom Payloads Mega Cheat Sheet
✅ The Ultimate Cheat Sheet for Android and iOS hacking: Part II (Dynamic Analysis)
✅ The Ultimate Cheat Sheet for Android and iOS hacking: Part I (Static Analysis)
🧮 How to install solc in Linux and compile smart contracts
🧮 How to install and use Paradigm Foundry to test and deploy smart contracts
🥷 Metasploit Meterpreter Cheat Sheet
🔝 How to get a xp_cmdshell reverse shell in a Windows Server