Blog

Linux Bash Tasks

A simple Linux bash script to automate some mundane Linux OS tasks found at our Github.
Page redirects to our GitHub.com.

View on GitHub
Blocking specified ports with ipchains

Simple Linux chained commands that help the uses of configuring IP chains on your Linux system.

Read More
Automate registry email add

Script used to automate the addition of an email account through the registry to the user's computer.

View on GitHub
Advanced Google Queries

This is a picture snapshot anyone can use to query the Internet at large for keywords of interest. This is part of a basic skill of intelligence gathering that anyone can use.

View snapshot
Advanced Threat Hunting With Splunk

This is an example of advance threat emulation and the use of Splunk to threat hunt for the malicious IOCs and IOAs.

Read More
The Vectr platform for red and blue teaming assessments

The Vectr is an open-source platform for red teaming and blue teaming assessments to track their internal operations to plan, execute, and assess their attack simulations.

View on YouTube
Why Most Cyber Security Training Doesn't Work

New methods of effective training can provide users with practical advice in a topically focused software-based training session that takes less than 10 minutes.

Read more on ProofPoint site
Mistakes People Make that Lead to Security Breaches

Technological holes account for a great number of the successful break-ins, but people do their share, as well.

Read more
OSCP - Win32 Exploit Development HD (old)

OSCP - Win32 Exploit Development HD (old) video going over attack paths and exploit development for your OSCP course.

View on YouTube
An introduction to Covenant C2 (Raspberry PI 4 install)

An introduction to Covenant C2. Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.

View on YouTube
CFC Red Team Village CyberSkill Challenge 2024

In 2024 I volunteered as a red teamer to stress test Cybersecurity teams at a national conference. Here is my video on how I resolved the challenge to quality for the event and become a Red Teamer for one day.

View on YouTube
Cobalt Strike quick training (old video, low resolution) English

An old video on Cobalt Strike functionality, usage, getting reverse shell, and much more. Russian subtitles I am not responsible for.

View on YouTube
Linux Essentials course

Linux essentials for learning about the distro and usage of Linux commands.

Bookmark this link
Linux Incident Response course

Course to Learn Incident Response

Bookmark this link
Offensive Security hacker course

Learn offensive ethical hacking

Bookmark this link
Active Directory complete security

Learn from scratch how to attack and defend your Microsoft Windows Active Directory domains

Bookmark this link
Become a great hacker

Build on the offensive ethical hacking course to advance your hacking skills with evasion and Active Directory attacks

Bookmark this link
A toast to Kerberoast

Quick intro to Kerberoasting in Windows for Active Directory

Bookmark this link
Attacking Active Directory

Building and attacking a Microsoft Active Directory

Bookmark this link
The MS17-010 exploit (quick exercise)

Try exploiting the MS17-010 with this quick exercise.

Bookmark this link
CanYouSeeMe.org

Check your public IP and open ports online.

Bookmark this link
Online courses repo

Online courses repo

Bookmark this link
Cheap domains and more

Cheap domains and more

Bookmark this link
CyberForce® 101 Library

CyberForce® 101 Library and documents

Bookmark this link
Malware Gallery

Welcome to the virtual museum dedicated to the rich history of malware.

Bookmark this link