PinnedPublished inOSINT TeamTools you should know as a Security Professional — Part 2My last article “15 Tools you should know as a security analyst” turned out to be well received by many viewers. Such success prompted me…Mar 19, 20243Mar 19, 20243
PinnedPublished inOSINT Team15 tools you should know as a Security AnalystWhether you’re looking to break into cyber security, already working in a SOC, penetration tester or consulting, it’s essential to know…Apr 16, 20233Apr 16, 20233
Published inOSINT Team25 Top Search Engines for PentestersThis article will give you a handy list of powerful search engines used by pentesters, security researchers and bug bounty hunters.Nov 8, 2024Nov 8, 2024
Recovering Files from a Dead PCHave you ever found yourself in a situation where you need to retrieve important files from your laptop or desktop PC, but it just won’t…Jul 8, 2024Jul 8, 2024
Published inOSINT TeamOSINT Diaries: Hunting a Cyber BullyImage generated by Bing AIAug 8, 2023Aug 8, 2023
Brute Forcing RDP & How to MitigateWindows Remote Desktop Protocol (RDP) is commonly used by system administrators for remote access. It enables remote display and input for…Sep 26, 2022Sep 26, 2022
Published inOSINT TeamSOC Exercises: Tracing Threats Through EmailsIf you’re considering a career in cyber security, now has never been a better time. Typically, one of the entry level roles in this…Apr 27, 2022Apr 27, 2022