Blog

Linux Bash Tasks

A simple Linux bash script to automate some mundane Linux OS tasks found at our Github.
Page redirects to our GitHub.com.

View on GitHub
Blocking specified ports with ipchains

Simple Linux chained commands that help the uses of configuring IP chains on your Linux system.

Read More
Automate registry email add

Script used to automate the addition of an email account through the registry to the user's computer.

View on GitHub
Advanced Google Queries

This is a picture snapshot anyone can use to query the Internet at large for keywords of interest. This is part of a basic skill of intelligence gathering that anyone can use.

View snapshot
Advanced Threat Hunting With Splunk

This is an example of advance threat emulation and the use of Splunk to threat hunt for the malicious IOCs and IOAs.

Read More
The Vectr platform for red and blue teaming assessments

The Vectr is an open-source platform for red teaming and blue teaming assessments to track their internal operations to plan, execute, and assess their attack simulations.

View on YouTube
Why Most Cyber Security Training Doesn't Work

New methods of effective training can provide users with practical advice in a topically focused software-based training session that takes less than 10 minutes.

Read more on ProofPoint site
Mistakes People Make that Lead to Security Breaches

Technological holes account for a great number of the successful break-ins, but people do their share, as well.

Read more
OSCP - Win32 Exploit Development HD (old)

OSCP - Win32 Exploit Development HD (old) video going over attack paths and exploit development for your OSCP course.

View on YouTube
An introduction to Covenant C2 (Raspberry PI 4 install)

An introduction to Covenant C2. Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.

View on YouTube
CFC Red Team Village CyberSkill Challenge 2024

In 2024 I volunteered as a red teamer to stress test Cybersecurity teams at a national conference. Here is my video on how I resolved the challenge to quality for the event and become a Red Teamer for one day.

View on YouTube
Cobalt Strike quick training (old video, low resolution) English

An old video on Cobalt Strike functionality, usage, getting reverse shell, and much more. Russian subtitles I am not responsible for.

View on YouTube
Linux Essentials course

Linux essentials for learning about the distro and usage of Linux commands.

Bookmark this link
Linux Incident Response course

Course to Learn Incident Response

Bookmark this link
Offensive Security hacker course

Learn offensive ethical hacking

Bookmark this link
Active Directory complete security

Learn from scratch how to attack and defend your Microsoft Windows Active Directory domains

Bookmark this link
Become a great hacker

Build on the offensive ethical hacking course to advance your hacking skills with evasion and Active Directory attacks

Bookmark this link
A toast to Kerberoast

Quick intro to Kerberoasting in Windows for Active Directory

Bookmark this link
Attacking Active Directory

Building and attacking a Microsoft Active Directory

Bookmark this link
The MS17-010 exploit (quick exercise)

Try exploiting the MS17-010 with this quick exercise.

Bookmark this link
CanYouSeeMe.org

Check your public IP and open ports online.

Bookmark this link
Online courses repo

Online courses repo

Bookmark this link
Cheap domains and more

Cheap domains and more

Bookmark this link
CyberForce® 101 Library

CyberForce® 101 Library and documents

Bookmark this link
Malware Gallery

Welcome to the virtual museum dedicated to the rich history of malware.

Bookmark this link
32 Advanced Search Engines For Hackers and security professionals

Use these websites and tools for your initial reconnaissance work

Bookmark this link
The Swedish philosophy of lagom: how “just enough” is all you need

The idea that human desires are insatiable and that craving leads to misery is not new wisdom.

Bookmark this link
Can't Afford an MBA?

Can't Afford an MBA? Read These 6 Books to Educate Yourself Instead

Bookmark this link
Host your own cloud with Raspberry Pi NAS

Protect and secure your data with a self-hosted cloud powered by your Raspberry Pi.

Bookmark this link
Cyber Security business

Research on the cyber security business.

Bookmark this link
Digital Marketing courses and companies

Research to learn about digital marketing courses and companies.

Bookmark this link
How does SPF work?

Follow the image to learn about SPF.

Bookmark this link
Cursuri Automatică și Calculatoare

Ceea ce vei găsi aici sunt fie materiale publice, ce au fost puse la dispoziția tuturor studenților, fie materiale create de mine sau de către prietenii mei.

Bookmark this link
Security+ certification (older)

Questions and answers from the Security plus certification for warmup and interviews.

Bookmark this link
Simple steps to combat spam

Are you following these steps to combat spam in your organization or business?

Bookmark this link
Enterprise security tips for network administrators

Are you following these security steps to protect your business or organization from cyber attacks?

Bookmark this link
Phishing for Windows Credentials

Have you phished your employees with these methods to protect your business or organization by testing its weakest links?

Bookmark this link
Corelan related links

Corelan Exploit Development courses - free links

Bookmark this link
Red Teaming Infrastructure Wiki

Learn how to build your red teaming infrastructure for pentesting events.

Bookmark this link
Managing the CrowdStrike AV/EDR platform

Learn how to manage the CrowdStrike AV/EDR for maximum performance and benefit.

Bookmark this link
IT Support Checklist for Growing Businesses

IT Support Checklist for Growing Businesses.

Bookmark this link
Top SMB Cybersecurity Threats in 2025

Learn about the Top SMB Cybersecurity Threats in 2025.

Bookmark this link
How to Secure Data Backups in the Cloud

Learn How to Secure Data Backups in the Cloud.

Bookmark this link
Cloud Security Myths That Put SMBs at Risk

Learn how to manage the Cloud Security issues that put SMBs at Risk.

Bookmark this link
How to Pass a Cybersecurity Audit

Learn how to prepare to pass a CyberSecurity Audit.

Bookmark this link
How Managed IT Support Saves SMBs Money

How Managed IT Support Saves SMBs Money.

Bookmark this link
How to build a Security Operations Center (on a budget)

How to build a Security Operations Center (on a budget)

Bookmark this link
How to build a Security Operations Center (on a budget)

How to build a Security Operations Center (on a budget) (PDF version)

Bookmark this link