d3xitfl0w@web: ~$ |
Avatar
😀

Organizations

README.md

Hi! I’m happy to see you here! 🙂 This blog is a space where I share my experience, and insights on IT Security, Ethical Hacking, Penetration Testing, Privacy, Online Risks many of us face today. Whether you’re a seasoned expert or just starting to explore this field, or maybe just want to extend your awarness, I hope you find valuable information and resources that help you grow and stay informed! 🙂

If you want to know more about this site, go to About section.

Popular posts

  1. The Raspberry Pi Zero W P4wnP1 A.L.O.A. (A Little Offensive Application) image is a highly customized version of Kali Linux. It allows you to connect the Raspberry Pi to a computer or mobile device, sending and executing commands or acting as a HID (Human Interface Device).

    P4wnP1 Raspberry Pi DYI Kali Pentesting

  2. In this post I will cover log4j Vulnerability, also know as log4shell found in UniFi appliance. To better understand cyberattacks this walkthrough will be presented from Cyber Kill Chain perspective.

    Lab Pentesting Red Teaming Hacking log4shell

  3. In this post you will get to know benefits of using virtual lab and learn how to setup your own virtual penetration testing home lab based on VirtualBox.

    Lab VirtualBox Pentesting

  4. Useful Linux commands with examples that helps you start and work with a Linux administration.

Post activity