PinnedShreelu Santosh (Lun4rC1ph3r)Metasploit Framework (Part 1): Setting up Metasploitable2 in VirtualBoxSetting up an intentionally vulnerable machine for pentestingJun 6Jun 6
PinnedShreelu Santosh (Lun4rC1ph3r)Setting up and Running my first Nessus scanToday’s cybersecurity task involves learning and using Nessus, a popular vulnerability scanner tool.Apr 21Apr 21
Shreelu Santosh (Lun4rC1ph3r)Metasploit Framework (Part 2): Connecting Kali Linux machine to MetasploitablePart 2 of Metasploit Framework Learning SeriesJun 6Jun 6
Shreelu Santosh (Lun4rC1ph3r)HTB Writeup: Pwning AppointmentExploiting SQL vulnerabilitiesMay 24May 24
Shreelu Santosh (Lun4rC1ph3r)Introduction to Threat HuntingMy notes from Security Blue Team’s Introduction to Threat Hunting free course.Apr 21Apr 21