PinnedTips for Preparing CISSP 🚀Discover the keys to CISSP success: my journey, top resources, and tips for mastering the cybersecurity pinnacle.Mar 16, 2024Mar 16, 2024
Using PyTM for Effective Threat Modeling in the WorkplaceIn this article, I will share my experience using PyTM, a Python library for threat modeling, with the help of ChatGPT to enhance the…Oct 2, 2024Oct 2, 2024
Use Command to Connect to VPN with Kali Network ManagerLast time I wrote an article to introduce how to import OpenVPN profile into Kali Linux Network Manager so that you can setup the VPN with…Apr 24, 2024Apr 24, 2024
Personal Journey to Securing My Synology NAS with a Wildcard CertificateA Journey Through Complexity: Triumphs and Trials in Securing My Digital DomainApr 6, 2024Apr 6, 2024
SSRF URL Payload Encoding TryhackMe OWASP Top 10–2021 Task22 ExplainedWhat is SSRF?Apr 3, 2024Apr 3, 2024
Enhancing Ethical Hacking Efficiency: Integrating Kali Linux with VSCodeIntegrating Kali Linux with VSCodeMar 28, 2024Mar 28, 2024
A Quick Guide to Setting Up TryHackMe VPN on Kali Linux Network ManagerTryHackMe VPN with Kali Network Manager SetupMar 25, 2024Mar 25, 2024
White Cards: Ensuring Safety in Red Team Engagements | TryHackMe | Red Team EngagemIn red team engagements, a “white card” is a tool used to facilitate the exercise, especially when simulating cyber attacks or security…Mar 23, 2024Mar 23, 2024
Unlocking OSCP Lab 6.3.3–5: Essential Nmap Port Scanning Techniques (http header)Unlock Nmap port scanning secrets for OSCP Lab 6.3.3. Step-by-step guide and tips for penetration testing mastery.Mar 16, 2024Mar 16, 2024