PenTesting

Penetration Testing

19 March 2019
Penetration Testing Advice on how to get the most from penetration testing https://www.ncsc.gov.uk/guidance/penetration-testing Penetration testing is…

OSCP Intro Letter

5 November 2017
  OSCP Intro Letter Dear Applicant,Thank you for your interest in Penetration Testing with Kali Linux. Please read this entire email carefully as it c…

Bug Bounties

18 August 2017
Bug Bounties HackerOne Bugcrowd https://yeswehack.com/programs https://www.vulnmachines.com/ Vulnerability Lab Fire Bounty https://www.hackthebox.eu/ …

Mailware analysis

19 April 2017
Mailware analysis Debuggers - gdb, WinDBG, OllyDBG Operating System Primer - https://www.slideshare.net/saumilshah/operating-systems-a-primer How func…

PenTesting Methodology

11 October 2016
PenTesting Methodology F3EAD Model Find: essentially ‘picking up the scent’ of the opponent, with the classic “Who, What, When, Where, Why” questions …

Kali Cheatsheet

9 October 2016
Kali Cheatsheet The following is a list of improvements to the Kali distro to turbo charge your Pen Test tool kit.. Fresh Install Setup Kali on AWS - …

DDoS for Research Only

22 September 2016
http://resources.infosecinstitute.com/dos-attacks-free-dos-attacking-tools/#download DDoS for Research Only "In order to protect one must understand h…