Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Revolutionize XSS Detection: Fine-Tune Your Own AI XSS Hunter with Unsloth & LLMs (Llama 3, Gemma, etc.)

Cross-Site Scripting (XSS) remains a persistent and dangerous threat in web applications. Traditional detection methods have their limits, ...

Setting Up MITRE CALDERA with Atomic, EMU & SSL

In this tutorial, you’ll learn how to build and run a customized MITRE CALDERA Docker image with the Atomic and EMU plugins enabled, sec...

Abusing GMSA Permissions - What You Need to Know as a Pentester

Group Managed Service Accounts (gMSAs) are designed to simplify password management for services running across multiple servers in a domain...

IPv6 DNS Takeover - Attacking & Exploitation IPV6

IPv6 is enabled by default on Windows networks starting from Windows Vista and Server 2008. This default configuration presents an opportun...

Understanding Kerberos Authentication and its Attacks

Kerberos is a widely used authentication protocol that ensures secure identity verification within networks. It relies on a trusted third pa...

Postgres Pentest Cheatsheet - Port 5432

nmap -sC -sV --script vuln,vulners --script-args mincvss=7.0 -p5432,5433 -Pn 10.10.10.10 #make sure to check for vulnerable versions Brute...

Ldap Penetration Testing Cheatsheet - Port 389,636

  LDAP - Port 389 or LDAP SSL on Port 636 Nmap Scan map -n -sV --script "ldap* and not brute" -p389,636,3268,3269 10.10.10.10 nm...

Running DeepSeek AI Locally on your PC/Laptop

DeepSeek, a groundbreaking Chinese artificial intelligence (AI) company founded in 2023 by Liang Wenfeng and headquartered in Hangzhou, Zhej...

Cheat Sheets

[Cheatsheet][grids]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]