PinnedTips for Preparing CISSP 🚀Discover the keys to CISSP success: my journey, top resources, and tips for mastering the cybersecurity pinnacle.Mar 16Mar 16
Using PyTM for Effective Threat Modeling in the WorkplaceIn this article, I will share my experience using PyTM, a Python library for threat modeling, with the help of ChatGPT to enhance the…Oct 2Oct 2
Use Command to Connect to VPN with Kali Network ManagerLast time I wrote an article to introduce how to import OpenVPN profile into Kali Linux Network Manager so that you can setup the VPN with…Apr 24Apr 24
Personal Journey to Securing My Synology NAS with a Wildcard CertificateA Journey Through Complexity: Triumphs and Trials in Securing My Digital DomainApr 6Apr 6
Enhancing Ethical Hacking Efficiency: Integrating Kali Linux with VSCodeIntegrating Kali Linux with VSCodeMar 28Mar 28
A Quick Guide to Setting Up TryHackMe VPN on Kali Linux Network ManagerTryHackMe VPN with Kali Network Manager SetupMar 25Mar 25
White Cards: Ensuring Safety in Red Team Engagements | TryHackMe | Red Team EngagemIn red team engagements, a “white card” is a tool used to facilitate the exercise, especially when simulating cyber attacks or security…Mar 23Mar 23
Unlocking OSCP Lab 6.3.3–5: Essential Nmap Port Scanning Techniques (http header)Unlock Nmap port scanning secrets for OSCP Lab 6.3.3. Step-by-step guide and tips for penetration testing mastery.Mar 16Mar 16