Prepare to hack : Getting your environment ready August 29, 2023 The first step for you to start doing your pentesting activities is to have an environment as complete as possible ahead of your exercises...Read More
Extracting Windows Credentials with Pypykatz June 14, 2023 In this post we'll dive into the methods to dump SAM Database, decrypt it and attempt to obtain Windows Credentials. Whether you a...Read More
Installing BloodHound on Windows June 11, 2023 BloodHound, is a tool wide used by red teamers to interact and find attack paths within a domain. It utilizes graph theory to uncover ...Read More
Hacking with cURL Commands June 09, 2023 Are you curious about how to use curl commands to hack? You've come to the right place! In this blog, we'll go over the basics...Read More
Build your First Node.js Application with Docker April 07, 2023 In our previous post we learned how to deploy a web app using k8s, now we are going to actually build the web app on Docker. Let...Read More
Deploying a Web App with Kubernetes in Kali Linux April 02, 2023 Let me show you how easy it is to install k8s and deploy a web app in kali linux. My original idea was to jump to pentesting kubernete...Read More
Bypassing authentication in a NoSQL db January 31, 2023 NoSQL databases are built without a schema and therefore are not structured, and you can query them not only using SQL language. With ...Read More
ngrok : Web Services Exposed with ONE COMMAND January 16, 2023 In this post I will show you how to expose web services with one command using ngrok.Read More