Scanning Big Networks - Evasion, Automation and Visualization
Advanced topics on network, host and port identification with defense evasion, automation of the scanning and results visualization.
Advanced topics on network, host and port identification with defense evasion, automation of the scanning and results visualization.
An overview of optimizing methods for network, host and port identification with nmap tool.

My journey on studying and passing the OSWP exam.

My journey on studying and passing the OSCP exam.
Introduction Hi! In this post I want to explore Windows File Transfers. There’s several ways to transfer files from our attacking machine to the Windows target, and from the Windows target to our ...
Introduction Hi! In this post I want we will explore some ways to optimize hash cracking. We can do it in many ways, for example by optimizing our cracking algorithms or improving hardware part. O...
There are a lot of situations, when you have to compile an exploit for a specific version of Windows, for example, to make a privilege escalation. But you have only Kali Linux and no idea how to de...
I had to install a Windows 10 VM to do some researches. But I’ve got a problem after the installation. There was not a Microsoft Store and of course I had to install some MS Store specific applicat...

Hi! In this post we continue exploring Vim and its features. Today we discuss some useful settings (or configuration) in Vim. I don’t think it is a full guide for Vim settings, I’ll show just featu...
Hi! Today I want to demonstrate a very powerful Vim feature - text objects. These objects make work with basic entities, like words, sentences or even paragraphs, much more effective. Introduction...