Pinnedm0lt3nCySA+ Notes and Exam TipsThis article is comprised of the topics I felt were most relevant when studying for CySA+. This is not a comprehensive list. Make sure you…9 min read·Mar 30, 2023--1--1
m0lt3nDeploying Ransomware: SentinelOne and Microsoft Defender AnalysisDid Someone Say Ransomware?2 min read·May 7, 2024----
m0lt3nBash Bunny Hak5 Setup and ExploitIn this article, I will show you how to set up your Bash Bunny and how to run your first payload!3 min read·Mar 2, 2024----
m0lt3nHacking a Vulnerable VM: Unmasking Vulnerabilities and Analyzing Incidents in KibanaTools5 min read·Nov 8, 2023--1--1
m0lt3nImproving SOC Alerting and Real-time Threat Analysis by Own EStudents will exploit a vulnerable WordPress installation. This task will bring them yet another step closer to a real-world penetration…5 min read·Nov 8, 2023----
m0lt3nProtecting Data in Today’s Digital Landscape: Understanding Key StandardsAs we navigate an increasingly interconnected world, safeguarding sensitive information has become a top priority for organizations and…2 min read·Aug 2, 2023----