
Git Secrets Hunter – Quick Guide
A step-by-step guide to recover sensitive information from an exposed Git repository. 1️⃣ Install git-dumper on Kali Git-dumper automates downloading an exposed .git folder. # Clone git-dumper g...
A step-by-step guide to recover sensitive information from an exposed Git repository. 1️⃣ Install git-dumper on Kali Git-dumper automates downloading an exposed .git folder. # Clone git-dumper g...
🕵️♂️ Port Forwarding with Windows: Netsh In internal network engagements, gaining access to a user workstation—like a Windows-based IT admin’s machine—can be an excellent pivot point for further ...
🛰️ ICMP Tunneling with ptunnel-ng & SOCKS: Pivot to WinTarget In this lab, we demonstrate how to use ptunnel-ng to establish an ICMP-based tunnel from an Attack Host to a Pivot Host, and then ...
⚙️ Note-Taking Tools Review: Notion vs. Obsidian When it comes to organizing thoughts, research, or OSINT logs, Notion and Obsidian stand out. 🔗 Notion A powerful all-in-one workspace. Great for ...
👾 Reflected XSS – Real-World Lab Let’s dive into Reflected Cross-Site Scripting (XSS), a client-side vulnerability used by attackers to execute malicious code in a victim’s browser. This lab simul...
Skills Assessment To complete this skills assessment, you will need to apply various techniques learned in this module, including: Using whois Analyzing robots.txt Performing subdomain bru...
Docker Overview Docker is a powerful platform for developing, shipping, and running applications inside lightweight containers. Containers package an application and its dependencies, ensuring con...
Lucky Panther CTF TryHackMe Room You can also join this room by going to My Rooms page and entering Code: luckypantherctf Task 1: Download the Image Start by downloading the provided image file....
[ ACCESS GRANTED ] > user: maz4l > status: active node Welcome to the blog. No filters. No scripts. Just raw signal. > Incoming data stream: - THM / HTB / SBT intel dumps - Exploi...