PinnedShreelu Santosh (Lun4rC1ph3r)Tips and Tricks to Crack Placements — Part 1: ResumeSo, the placement season is in full flow, and you’re wondering why your resume is not helping you get shortlisted for company tests, then…Aug 30Aug 30
PinnedShreelu Santosh (Lun4rC1ph3r)Metasploit Framework (Part 1): Setting up Metasploitable2 in VirtualBoxSetting up an intentionally vulnerable machine for pentestingJun 6Jun 6
Shreelu Santosh (Lun4rC1ph3r)Metasploit Framework (Part 2): Connecting Kali Linux machine to MetasploitablePart 2 of Metasploit Framework Learning SeriesJun 6Jun 6
Shreelu Santosh (Lun4rC1ph3r)HTB Writeup: Pwning AppointmentExploiting SQL vulnerabilitiesMay 24May 24
Shreelu Santosh (Lun4rC1ph3r)Introduction to Threat HuntingMy notes from Security Blue Team’s Introduction to Threat Hunting free course.Apr 21Apr 21
Shreelu Santosh (Lun4rC1ph3r)Setting up and Running my first Nessus scanToday’s cybersecurity task involves learning and using Nessus, a popular vulnerability scanner tool.Apr 21Apr 21