Skip to content
Linkedin
Github
Twitter
YouTube Channel
Linkedin
Github
Twitter
YouTube Channel
Intrusion Deception Systems and Honeypots
Learn Cybersecurity for FREE
Search
Search for:
Tags
app engine
buffer overflow
cloud
docker
exploitation
gcloud
gcp
hacks
hardening
hpe
modbus
ot
php
rce
secdevops
slack
terraform
vulnerability
xss
Pages
Blog
Defensive Security
Tools and frameworks for APPLICATION SECURITY
Tools and frameworks for BLUE TEAMS
Tools and frameworks for PURPLE TEAMS
Infrastructure and Network Testing
PHASE I: Reconnaissance
PHASE II: Scanning
PHASE III: Enumeration
PHASE IV: Exploitation
Brute forcing
Exploiting Cloud Infrastructure
Exploiting Network infrastructure
Intro to exploitation
Local Exploitation with Path Traversal
Msfvenom payloads Encyclopedia
Password cracking
SQL Exploitation: Injection and Remote Code Execution
PHASE V: Post exploitation
Direct and reverse shells
Environments escape
Intro to Post Exploitation
Metasploit Meterpreter Cheat Sheet
PowerShell frameworks for Post-exploitation
Privilege Escalation in Windows and Linux
PHASE VI: Covering Tracks
PHASE VII: Lateral Movement
Intro to Lateral Movement
Pivoting
Learn Cybersecurity for FREE
Mobile Security Testing
Dynamic Analysis for Android and iOS
Protections to mitigate attacks
Static Analysis for ANDROID and IOS
My Courses
OT ICS Security
Intrusion Deception Systems and Honeypots
Vulnerability Assessment for OT/ICS devices
Privacy Policy
Public contributions
Tools and Frameworks for RED TEAMS
Web Application Testing
Attacks on JavaScript Frameworks
Attacks on PHP websites
Attacks on SSL/TLS protocols
Intro to web application testing
More on Tools
OWASP TOP 10 explained
Types of Web Application Attacks
Webpentest through SOCKS proxy
What is Penetration Testing?
https://github.com/mushorg/conpot
conpot
: ICS/SCADA honeypot. Simulating Siemens S7 and other protocols
https://github.com/telekom-security/tpotce
T-Pot
– The All In One Honeypot Platform