PinnedPublished inOSINT TeamTools you should know as a Security Professional — Part 2My last article “15 Tools you should know as a security analyst” turned out to be well received by many viewers. Such success prompted me…Mar 193Mar 193
PinnedPublished inOSINT Team15 tools you should know as a Security AnalystWhether you’re looking to break into cyber security, already working in a SOC, penetration tester or consulting, it’s essential to know…Apr 16, 20233Apr 16, 20233
Published inOSINT Team25 Top Search Engines for PentestersThis article will give you a handy list of powerful search engines used by pentesters, security researchers and bug bounty hunters.Nov 8Nov 8
Recovering Files from a Dead PCHave you ever found yourself in a situation where you need to retrieve important files from your laptop or desktop PC, but it just won’t…Jul 8Jul 8
Published inOSINT TeamOSINT Diaries: Hunting a Cyber BullyImage generated by Bing AIAug 8, 2023Aug 8, 2023
Brute Forcing RDP & How to MitigateWindows Remote Desktop Protocol (RDP) is commonly used by system administrators for remote access. It enables remote display and input for…Sep 26, 2022Sep 26, 2022
Published inOSINT TeamSOC Exercises: Tracing Threats Through EmailsIf you’re considering a career in cyber security, now has never been a better time. Typically, one of the entry level roles in this…Apr 27, 2022Apr 27, 2022