Posts
Data Exfiltration: Data exfiltration techniques and command patterns used in post-exploitation to collect fil...
High Frequency (13.56 MHz): Practical 13.56 MHz RFID overview covering common card technologies, attack surface, and c...
Low Frequency (125 KHz): Introduction to 125 KHz low-frequency RFID basics, attack surface, and practical cloning/t...
Rogue AP: Rogue Access Point walkthrough covering fake hotspot setup, credential-capture flow, and p...
Bash Scripting Cheatsheet: Bash scripting cheatsheet with common syntax, conditionals, loops, functions, and command-...
Pentest Cheatsheet: Pentest cheatsheet with practical post-exploitation and privilege-escalation techniques, i...
Port Cheatsheet: Port pentesting cheatsheet for common services, with quick enumeration and exploitation ti...