Tutorials

Quick Start – Comprehensive Guide To Installing And Configuring Malcolm On Linux Platforms

The files required to build and run Malcolm are available on its [GitHub page]({{ site.github.repository_url }}/tree/{{ site.github.build_revision }}). Malcolm's source-code…

10 months ago

Machine Learning Tutorials Repository – Unlocking The Power Of AI Learning

Welcome to the Machine Learning Tutorials Repository! This is the go-to spot for all the code associated with my Twitter tutorials.…

12 months ago

Ghidra Script Mastery – Managing And Automating With GhidraScripts For Golang

Scripts to run within Ghidra, maintained by the Trellix ARC team. Ghidra, the open-source software reverse engineering tool, is known…

1 year ago

Burp Suite Tutorial – A Web Application Penetration Testing Tool – Beginners Guide

In this Burp Suite Tutorial, we are going to elaborately describe the Burp Suite tool and its features that are…

2 years ago

Metasploit Framework – A Beginner’s Guide for Penetration Testing & Exploit Development

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a…

2 years ago

Whatweb – A Scanning Tool to Find Security Vulnerabilities in Web App

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify…

2 years ago

Fantastic Storage Solutions for Tech Companies

Running a tech company can leave you with a lot of clutter. Trailing wires, old devices, paperwork, and filing cabinets…

5 years ago

What to Look for in the Right SOC Program – A Complete Guide

SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter…

5 years ago

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in…

7 years ago

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety…

7 years ago