Remote Shell Cheatsheet
This cheatsheet provides a comprehensive overview of reverse shell techniques, including command examples for both Linux and Windows environments. It serves as a quick reference for cybersecurity p...
This cheatsheet provides a comprehensive overview of reverse shell techniques, including command examples for both Linux and Windows environments. It serves as a quick reference for cybersecurity p...
Linux Privilege Escalation Privilege Escalation is the process of exploiting a security vulnerability to gain higher-level access to a system or network. It involves taking advantage of a syste...
This post serves as a guide to creating a professional blog that can enhance your CV and showcase your skills. It covers the essential steps and considerations for building a blog that stands out i...
This notebook serves as the supporting material for the Linux 101 for Hackers workshop, presented in association with Hawks Security Academy . It provides a structured introduction to Linux fundame...
This notebook serves as the supporting material for the Python 101 for Hackers workshop, presented in association with Hawks Security Academy . It provides a structured introduction to Python funda...