All posts

vulnversity.png
Vulnversity - TryHackMe

8 min read

In this walkthrough we will demonstrate the steps necessary to complete the Vulnversity room on TryHackMe.

writeup thm offsec web privesc recon
vulnversity.png
Vulnversity - TryHackMe

8 min read

In this walkthrough we will demonstrate the steps necessary to complete the Vulnversity room on TryHackMe.

writeup thm offsec web privesc recon
Cyber tools laid out on table
Tool list

Members only

12 min read

There's generally a tool for everything in cybersecurity - but I've made an attempts to list all the tools I come across in my work and studies.

notes members
Cyber tools laid out on table
Tool list

12 min read

Members only

There's generally a tool for everything in cybersecurity - but I've made an attempts to list all the tools I come across in my work and studies.

notes members
 magic book, black background, paper
Terminology

Members only

3 min read

The space of cybersecurity is known for having a lot of terms and acronyms to keep track of. Here's a handy page with all the terminology I've come across!

notes members
 magic book, black background, paper
Terminology

3 min read

Members only

The space of cybersecurity is known for having a lot of terms and acronyms to keep track of. Here's a handy page with all the terminology I've come across!

notes members
phishing.jpg
Social Engineering Notes

Members only

3 min read

Even though Phishing is the most common of Social Engineering techniques - there are many others. Here are my notes I've taken!

notes members
phishing.jpg
Social Engineering Notes

3 min read

Members only

Even though Phishing is the most common of Social Engineering techniques - there are many others. Here are my notes I've taken!

notes members
Full Red
Red Teaming Notes

Members only

64 min read

Offensive security is just as important as pure defensive action and just as fun! Here I have my long, long list of notes structured after Mitre Attack.

notes offsec members
Full Red
Red Teaming Notes

64 min read

Members only

Offensive security is just as important as pure defensive action and just as fun! Here I have my long, long list of notes structured after Mitre Attack.

notes offsec members
Python stock image
Python Notes

Members only

2 min read

Python is a very popular and powerful programming- and scripting language, which makes it all so powerful within cybersecurity. Here are my notes from my python experiences!

notes python members
Python stock image
Python Notes

2 min read

Members only

Python is a very popular and powerful programming- and scripting language, which makes it all so powerful within cybersecurity. Here are my notes from my python experiences!

notes python members
PowerShell Stock Image
PowerShell Notes

Members only

3 min read

PowerShell is crucial when exploring a Windows environment, both as an attack and a defender. Therefore I have this page related to Powershell.

notes powershell members
PowerShell Stock Image
PowerShell Notes

3 min read

Members only

PowerShell is crucial when exploring a Windows environment, both as an attack and a defender. Therefore I have this page related to Powershell.

notes powershell members
Misc. Adobe stock image.
Other Notes

Members only

8 min read

There are so many things one does not want to forget, thus this is my "Misc" note with small fixes and stuff that doesn't belong in any other category.

notes members
Misc. Adobe stock image.
Other Notes

8 min read

Members only

There are so many things one does not want to forget, thus this is my "Misc" note with small fixes and stuff that doesn't belong in any other category.

notes members