eLearnSecurity's Web Application Penetration Tester Review

My thoughts on eLearnSecurity's Web App Penetration Testing course.…

Cobalt Strike!

A beginner's guide to the tool used for adversary simulations and Red Team operations: Cobalt Strike.…

7 Tools For Malicious Document Creation

Quick coverage of seven different tools that can be used to generate malicious macro payloads. They can then be embedded into Office documents and used for phishing.…

Using SMBClient to Enumerate Shares

This blog post seeks to demonstrate the vulnerabilities of SMB NULL sessions, and how to test them with smbclient.…

Fork Sparta, Join The Legion

A look at the tool "Legion" which is a fork of "Sparta" with some improved features.…