REHAN SAYYEDdignitas.hashnode.dev·Feb 16, 2025Hardening Azure: Identifying and Mitigating Entra ID Security GapsAzure is a complete Content Security Provider (CSP) with over 200 services to meet different organizational needs. These services include Identity Management, data handling, computing, analytics, storage, networking, and more. With Azure, organizatio...41 likes·39 reads#microsoft-azure
Bibek Dhunganablog.bdhungana.com.np·Feb 15, 2025Linux Privilege EscalationIf you are a pentester, CTF player or anyone who loves to pwn stuffs you might have gain the shell access to the linux servers at some time. Is it the dead end now? Hell, no. when it’s come to post exploitation, there is some much to cover. Below is ...1 like·240 readspentesting
jamarirjamarir.hashnode.dev·Feb 8, 2025[GameHacking] Cheat Engine Basics - Tutorials, Tips, and TricksJust another Memory Scan / IEEE754 / Pointer Map_Scan / Code Cave / Structure Cheat Table Framework Code Differentiation Write-up (and rebirth from childhood). Some far-from-exhaustive Game Hacking resources: Game Hacking Academy Cheat Engine Tuto...30 readsReverse EngineeringCTF
bst04cybersources.hashnode.dev·Feb 6, 2025SQLMap: Your Ultimate Tool for Automating SQL Injection TestingIn the realm of web application security, identifying vulnerabilities like SQL injection is critical to protecting sensitive data. One of the most powerful tools in a pentester's arsenal is SQLMap, an open-source penetration testing tool designed to ...10 likes·37 readsToolssqlmap
bst04cybersources.hashnode.dev·Feb 6, 2025PentesterGPT: Your AI-Powered Sidekick for Ethical HackingIn the ever-evolving world of cybersecurity, tools are constantly being developed to help ethical hackers stay ahead of potential threats. One such innovation is PentesterGPT, an AI-driven assistant designed specifically for penetration testers and s...10 likes·32 readsResourcescybersources
Victor Ukohatpscript.hashnode.dev·Feb 3, 2025CTF Solution: EMPIRE:LupinOneHello fellas, in this write-up, we'll provide the solution to the CTF, Empire:LupinOne. This is an easy-medium CTF. Although, a few hints were gotten from the discord channel to solve this. Let's dive straight into it. As usual, after importing the C...CTF SolutionsCTF Writeup
Anujcyb3rsec.hashnode.dev·Jan 24, 2025Aws-cli IntroductionAWS (Amazon Web Services) is a cloud computing platform provided by Amazon that offers a broad set of services, including computing power, storage, databases, networking, machine learning, and analytics, among others. These services enable individual...1 like·26 readsAWS PentestingAWSBeginner
INDRAYAN SANYALsecurityidiots.hashnode.dev·Jan 23, 2025Hacking SAML Part: 4Continuing with XML Signature Wrapping (XSW)… XML Signature Wrapping (XSW) : Description : XML Signature Wrapping (XSW) is a well-known attack vector that targets XML-based applications, particularly those utilizing XML Signature for securing message...SAML Hacking
Manish ShivanandhanforfreeCodeCampfreecodecamp.org·Jan 22, 2025Metasploit for Beginners — A Guide to the Powerful Exploitation FrameworkIf you’re starting your journey into penetration testing, you’ve likely heard of Metasploit. Metasploit is one of the most versatile tools in cybersecurity. It helps simplify vulnerability testing and exploitation. Metasploit helps us find and fix we...metasploit
xpl0itm4sterxpl0itm4ster.hashnode.dev·Jan 20, 2025Auditando APIsAntes de auditar un API es útil realizar un periodo de validación para verificar si esta operativa, encontrar credenciales, versiones, documentación e información sobre su propósito, mientras más información se encuentre se tendrá mejores probabilida...pentesting