Who should take this course? The Practical Phishing Campaigns course from TCM Security is tailored for a wide range of individuals within the cybersecurity domain. If you're a penetration tester, security analyst, or system administrator looking to enhance your phishing campaign skills, this course is ideal for you. It's also beneficial for those who have... Continue Reading →
What do I think of Practical Bug Bounty course from TCM Security with Heath Adam, Alex Olsen, and Jonah Burgess from Intigriti
The Practical Bug Bounty course by TCM Security, led by Heath Adams, Alex Olsen, and Jonah Burgess from Intigriti, is a thorough exploration of hacking and web application security. Alex's extensive knowledge and Heath's significant community contributions are evident throughout the course. Despite its focus on bug bounty hunting, the course offers a wide range... Continue Reading →
Creating a seamless multi-OS environment. Running Linux and Windows and share data easy with insync between OS and running shared config for applications like Remote Manager.
Hi! I got it working last night and wanted to share the news with you. Goal Ensuring uniform configurations across diverse operating systems poses a notable challenge. In the initial scenario, the objective is to deploy a remote application consistently across all machines, maintaining identical configurations. Furthermore, this requirement extends to encompass a broader spectrum.... Continue Reading →
Install, build and run Sn1per. Testing the free version. @Sn1perSecurity #attacksurface #infosec #assetmanagement #attacksurfacediscovery #bugbounty #platform #netsec #offsec #redteam #pentest #attacksurfacemanagement
Hi all out there. It is time to take a look at sn1per. A tool that automate opensource stuff for us. As always we start with the steps Install some os in my kase running kaliGet the docker fileBuildRun sn1per installation wget https://raw.githubusercontent.com/1N3/Sn1per/master/Dockerfile docker build -t sn1per . Below is gonna take some time to... Continue Reading →
Add portgroups on a vswitch is pain in the *ss, but you can use this simple script to get it done. @vExpert #esxi #vswitch @VMware #vCommunity
Hi! Not everyone are using distributed switches in there vmware enviroment or the licence for host profiles. Some uses ordinary vswitches, like me. And every time I do a reinstall or add new hosts I have alot of vlans to add. You can do it from GUI, but it takes time. You can use api:s,... Continue Reading →
Attending Cyber Threat Hunting Level 1 w/ Chris Brenton | 4-hours and want to run the VM in QEMU/KVM this is how I got it to work. @ActiveCmeasures #activecountermeasures #AIHunter #ThreatHunting #Beacons #Activecountermeasures @Zeekurity
Hi all! If you are like me attending the Threat Hunting Training Course named Cyber Threat Hunting Level 1 w/ Chris Brenton | 4-Hours on Thursday and want to run the virtual machine in qemu/kvm native do it like this. Download and read the below link! https://www.activecountermeasures.com/cyber-threat-hunting-training-course/ As always start with the short version! Convert... Continue Reading →
Adding automating pentest tools for WebApi to my hacking rig. Astra and Fuzzapi. @bsdbandit @RedSiege @TimMedin @Fuzzapi0x00 #OpenSource #Security #WebServices #API #webapi
This blog will be relatively short, but I thought the webinar I listened to was so interesting that I have to write about it. Webinar from Red Siege yesterday evening (21.00 Swedish time) regarding hacking webapi. Link: https://www.redsiege.com/api/. This was presented by @bsdbandit. I was blown away, this is really cool stuff. I was the... Continue Reading →
Using MindMap application when doing pentest or ctf! Up for you to decide. #MindMaps #freesoftware #kali #linux4hackers #linux #infosec #hacking #pentest #pentesting #redteam @kalilinux #ctf #bugbountytips @insilmaril
I was thinking about a nice and easy way to save a penetration test and come up with this.Use a MindMap application.There is a alot of MindMap application out there. I am running Linux on my machine so I ended up with VYM. (http://www.insilmaril.de/vym/)The nice thing about VYM is that it is free and comes... Continue Reading →
How to get autocompletion working great instead of good in powershell for linux. #powershell #pwsh #pwsh-preview #linux @ubuntu @powershell #autocompletion
My colleague @Schillman told me that you can get better autocompletion in powershell for linux. I thought that was interesting thing to try. Soon Sebastian will see the light in the tunnel and convert to a real operating system like linux and we will get more interesting things from him. This is what you can... Continue Reading →
Serverless Computing and Security what to think about. From @mwVme and @gilad_maayan #infosec #serverless #cloudsecurity #security
Really nice article about serverless computing and security problems that needs to get addressed NOW. Found the article at mwhite page but this article was written by Gilad David Maayan, guest writer for the site. But do not forget to look at other posts from Michael White, good stuff! Link to the article from Notes... Continue Reading →
How to install and run Salt from @SaltStack in my hacking rig. @VMware @thehackscast @thatch45 #saltconf @DjJimmyChunga #hacker #automation
Hi again! Today we are gonna take a look at Salt from Saltstack. On Sunday I was walking the dog and was listening to the podcast thehacks. I got very inspired by the podcast and wanted to really try this. I have never seen this product before. I have done some other tests in my... Continue Reading →