Hacking with cURL Commands June 09, 2023 Are you curious about how to use curl commands to hack? You've come to the right place! In this blog, we'll go over the basics...Read More
Build your First Node.js Application with Docker April 07, 2023 In our previous post we learned how to deploy a web app using k8s, now we are going to actually build the web app on Docker. Let...Read More
Deploying a Web App with Kubernetes in Kali Linux April 02, 2023 Let me show you how easy it is to install k8s and deploy a web app in kali linux. My original idea was to jump to pentesting kubernete...Read More
Bypassing authentication in a NoSQL db January 31, 2023 NoSQL databases are built without a schema and therefore are not structured, and you can query them not only using SQL language. With ...Read More
ngrok : Web Services Exposed with ONE COMMAND January 16, 2023 In this post I will show you how to expose web services with one command using ngrok.Read More
A Glimpse to AD Enumeration November 24, 2022 One of the main steps to start on your red team attack path is to make a footprint of the domain you are about to target. Here I sh...Read More
DNS Enumeration : A begginer's guide November 16, 2022The DNS is the responsible to match an IP address with its internet site name, this way we don't have to memorize all website's IPs...Read More