In case you don’t check our commit history on our GitHub on a daily basis, Empire 4.1 and Starkiller 1.9 were released toRead more
Now that Defcon and Blackhat are checked off for the year, we can get back to real work the funRead more
This step by step tutorial will show you how to use n8n to auto scrap TOR dark web onion websites to extract data, such as ransomware victims. This data can then be auto-posted for threat intelligenceRead more
If you have seen my previous tutorials, where I have created a PfSense Wireguard tutorial this will compliment that.
Start by installing ….Read more
To test if you are vulnerable to sudo buffer overflow for CVE-2021-3156 use the following command
Background In November, Kali announced a new program for supporting tool developers, which kicked off with sponsoring Byt3Bl33d3r. We areRead more
A tutorial explaining a workaround fix for KDE plasma / NVIDIA crashing to a black background and no taskbar in Kubuntu with an external monitor.Read more
Come and read the step by step walkthrough guide to Delivery on Hack The Box.
We start with a nmap scan to see what ports are available…Read more
A list of commands that can be used to test API keys that are found in Bug Bounty engagements.Read more
Hack The Box Walkthrough Guide to: ID Exposed using Google and OSINTRead more
Start with a nmap scan, then we want to open burp suite and navigate to…Read more
I start up the machine then always start with a quick Nmap and the follow it up with a more intense one shortly after. I highlight things that look interesting and may warrant further investigation.Read more