Pinnedm0lt3nCySA+ Notes and Exam TipsThis article is comprised of the topics I felt were most relevant when studying for CySA+. This is not a comprehensive list. Make sure you…Mar 30, 20231Mar 30, 20231
m0lt3nDeploying Ransomware: SentinelOne and Microsoft Defender AnalysisDid Someone Say Ransomware?May 7May 7
m0lt3nBash Bunny Hak5 Setup and ExploitIn this article, I will show you how to set up your Bash Bunny and how to run your first payload!Mar 2Mar 2
m0lt3nHacking a Vulnerable VM: Unmasking Vulnerabilities and Analyzing Incidents in KibanaToolsNov 8, 20231Nov 8, 20231
m0lt3nImproving SOC Alerting and Real-time Threat Analysis by Own EStudents will exploit a vulnerable WordPress installation. This task will bring them yet another step closer to a real-world penetration…Nov 8, 2023Nov 8, 2023
m0lt3nProtecting Data in Today’s Digital Landscape: Understanding Key StandardsAs we navigate an increasingly interconnected world, safeguarding sensitive information has become a top priority for organizations and…Aug 2, 2023Aug 2, 2023