A simple Linux bash script to automate some mundane Linux OS tasks found at our Github.
Page redirects to our GitHub.com.
Simple Linux chained commands that help the uses of configuring IP chains on your Linux system.
Read MoreScript used to automate the addition of an email account through the registry to the user's computer.
View on GitHubThis is a picture snapshot anyone can use to query the Internet at large for keywords of interest. This is part of a basic skill of intelligence gathering that anyone can use.
View snapshotThis is an example of advance threat emulation and the use of Splunk to threat hunt for the malicious IOCs and IOAs.
Read MoreThe Vectr is an open-source platform for red teaming and blue teaming assessments to track their internal operations to plan, execute, and assess their attack simulations.
View on YouTubeNew methods of effective training can provide users with practical advice in a topically focused software-based training session that takes less than 10 minutes.
Read more on ProofPoint siteTechnological holes account for a great number of the successful break-ins, but people do their share, as well.
Read moreOSCP - Win32 Exploit Development HD (old) video going over attack paths and exploit development for your OSCP course.
View on YouTubeAn introduction to Covenant C2. Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.
View on YouTubeIn 2024 I volunteered as a red teamer to stress test Cybersecurity teams at a national conference. Here is my video on how I resolved the challenge to quality for the event and become a Red Teamer for one day.
View on YouTubeAn old video on Cobalt Strike functionality, usage, getting reverse shell, and much more. Russian subtitles I am not responsible for.
View on YouTubeLinux essentials for learning about the distro and usage of Linux commands.
Bookmark this linkLearn from scratch how to attack and defend your Microsoft Windows Active Directory domains
Bookmark this linkBuild on the offensive ethical hacking course to advance your hacking skills with evasion and Active Directory attacks
Bookmark this linkQuick intro to Kerberoasting in Windows for Active Directory
Bookmark this linkTry exploiting the MS17-010 with this quick exercise.
Bookmark this linkWelcome to the virtual museum dedicated to the rich history of malware.
Bookmark this linkUse these websites and tools for your initial reconnaissance work
Bookmark this linkThe idea that human desires are insatiable and that craving leads to misery is not new wisdom.
Bookmark this linkCan't Afford an MBA? Read These 6 Books to Educate Yourself Instead
Bookmark this linkProtect and secure your data with a self-hosted cloud powered by your Raspberry Pi.
Bookmark this linkResearch to learn about digital marketing courses and companies.
Bookmark this linkCeea ce vei găsi aici sunt fie materiale publice, ce au fost puse la dispoziția tuturor studenților, fie materiale create de mine sau de către prietenii mei.
Bookmark this linkQuestions and answers from the Security plus certification for warmup and interviews.
Bookmark this linkAre you following these steps to combat spam in your organization or business?
Bookmark this linkAre you following these security steps to protect your business or organization from cyber attacks?
Bookmark this linkHave you phished your employees with these methods to protect your business or organization by testing its weakest links?
Bookmark this linkLearn how to build your red teaming infrastructure for pentesting events.
Bookmark this linkLearn how to manage the CrowdStrike AV/EDR for maximum performance and benefit.
Bookmark this linkIT Support Checklist for Growing Businesses.
Bookmark this linkLearn about the Top SMB Cybersecurity Threats in 2025.
Bookmark this linkLearn How to Secure Data Backups in the Cloud.
Bookmark this linkLearn how to manage the Cloud Security issues that put SMBs at Risk.
Bookmark this linkLearn how to prepare to pass a CyberSecurity Audit.
Bookmark this linkHow to build a Security Operations Center (on a budget)
Bookmark this linkHow to build a Security Operations Center (on a budget) (PDF version)
Bookmark this link