In this article, we’ll learn about a powerful Burp Extension cool tool called “Burp Logger++”. It is like a super detective for websites, always on
In this article, we will learn how to customise the Firefox browser for efficient pen-testing along with extensions you can use for the same purpose.
Python serialization vulnerabilities are a critical security concern when dealing with data exchange in Python applications. Serialization gathers data from objects, converts them to a
Credential Dumping – Active Directory Reversible Encryption is a technique that attackers commonly use to extract user credentials from Windows systems. According to MITRE, adversaries
Chisel port forwarding is a powerful technique that penetration testers and red teamers commonly use to bypass firewalls and securely access internal services. This guide
Blackfield is a windows Active Directory machine and is considered as hard box by the hack the box. This box has various interesting vulnerabilities, and
Evil-winrm tool is originally written by the team Hackplayers. The purpose of this tool is to make penetration testing easy as possible especially in the
Kerbrute is a tool used to enumerate valid Active directory user accounts that use Kerberos pre-authentication. Also, this tool can be used for password attacks
Antique is Linux machine and is considered an easy box by the hack the box. On this box, we will begin with a basic port