update 1
ssdcsdcsdcsdcsd
How to Use Hacking Platforms to Learn Ethical Hacking
As cyber threats become more sophisticated, the need for skilled ethical hackers has never been greater. This blog will explore how hacking platforms can help cyber security enthusiasts learn ethic...
Mythic C2 Framework Installation
The Mythic C2 Framework is a powerful, open-source tool used for Command and Control (C2) in cybersecurity contexts, particularly for red teaming and penetration testing. Developed by Mythic, it pr...
Azure Front Door as a C2 Redirector (Domain Fronting using Azure CDN)
Azure Front Door is a robust CDN (Content Delivery Network) service for improving the availability and performance of your applications by providing global load balancing and application accelerati...
Building your own Vulnerable AD LAB
Ever wondered what it would be like to build an Active Directory (AD) so frail it practically waves a white flag? Well, you’re in luck! In this post, we’ll guide you through constructing a small bu...
Writing a New Post
This tutorial will guide you how to write a post in the Chirpy template, and it’s worth reading even if you’ve used Jekyll before, as many features require specific variables to be set. Naming and...