d3xitfl0w@web: ~$ |
Avatar
😀

Organizations

README.md

Hi! 🙂

I’m happy you’re here! :) This blog is a space where I share my thoughts, experiences, and insights on IT Security, Ethical Hacking, Privacy, Online Risks many of us face today. Whether you’re a seasoned expert or just starting to explore this field, or maybe just want to extend your awarness, I hope you find valuable information and resources that help you grow and stay informed! :)

If you want to know more about this site, go to About section.

Popular posts

  1. In this post I will cover log4j Vulnerability, also know as log4shell found in UniFi appliance. To better understand cyberattacks this walkthrough will be presented from Cyber Kill Chain perspective.

    Lab Pentesting Red Teaming Hacking log4shell

  2. In this post you will get to know benefits of using virtual lab and learn how to setup your own virtual penetration testing home lab based on VirtualBox.

    Lab VirtualBox Pentesting

  3. Useful Linux commands with examples that helps you start and work with a Linux administration.

Post activity