Security Tips

Privacy Alternatives to Google Products

Privacy Alternatives to Google Products – It’s no surprise that google logs everything you do online while using their service,…

Command and Control Frameworks for Adversary Simulation and Red Team Operations

Command and Control Frameworks – most of the time abbreviated to C2, are necessary tools in maintaining access and making…

Who to follow on twitter

No BS tips and tricks from researchers concerning red teams, penetration tests, and adversary simulations. Topics discussed are but not…

Windows Security Artifacts

Log files & artifacts of built-in and popular apps in Windows that can aid red teams identify potentially important information…

Offensive Security Certified Professional Review Guide

Offensive Security Certified Professional (OSCP) Review Guide From Wikipedia – Offensive Security Certified Professional (OSCP) is an ethical hacking certification…

AWS Hosting Security Recommendation

In the majority of cases, breaches and data exposure happens due to user misconfiguration of available security settings. Most hosting…