Learn Ethical Hacking

[Ethical Hacking][bsummary]
latest posts

Linux Privilege Escalation Techniques

Hello everyone, below are the Linux Privilege Escalation Techniques. The below commands and techniques are the ones that I gathered when ...

Windows Privilege Escalation Cheatsheet for OSCP

Hello Everyone, here is the windows privilege escalation cheatsheet which I used to pass my OSCP certification. I am not a professional, ...

Linux Privilege Escalation Cheatsheet for OSCP

Hello Everyone,   below is the privilege escalation cheat sheet that I used to pass my OSCP certification. You can find lots of commands...

Best Programming Languages for Mobile App Development

Wondering what are some of the top programming languages are required for mobile app development? If your answer is yes, then I am here to...

Reverse Shells/ Web Shells Cheat sheet for Penetration Testing | OSCP

Hello, here is one of the most useful posts for Penetration testers – Reverse Shells and Web Shells all together in one place. Reverse sh...

Chance to Advance Your IT Career by Taking Microsoft MD-100 Exam with Practice Tests

As an introduction into the post, get acquainted with the fact that the Microsoft corporation internationally provides all-fields aiming ...

File Transfer Cheat Sheet for Penetration Testers | OSCP

Hello, here is one of the most useful take away for penetration testers and for people who are aiming to be one. Today I am sharing the f...

Linux 32-bit Binary Exploitation - Part II Buffer Overflow ret2libc

Hello Everyone, Welcome to the Part 2 of Linux 32-bit Binary Exploitation, if you have not gone through my previous article, it would reco...

Exploitation - Linux

[Kali Linux][twocolumns]

Learn Hacking Wifi Networks

[How To Hack Wifi][grids]