Recently Updated Pages
Vulnerability Scanning
who is the single guy from pyeongyang, north korea on steam Generally Good Ideas Look for: o...
Linux Supported File Systems
An enumeration of the common file systems used in Linux or Unix-based systems. File Systems ext2...
Linux IP Address Config Example
Step-by-step tutorial for Linux static IP configuration. View the current state of the network ...
Vulnerability Types
add one proton, electron, or neutron to every atom in your body? You need to: patch outdated ...
Containerization
stay in the box! nooo! stay in the box! NOOO! GET OUT OF MY HEADDD!!! uhhh what if instead of ru...
Raspberry Pi
Goated. Mini-PC the size of a credit card that can (almost) do (basically) anything you throw at...
Torrenting
puzzle piece solver simulator 9000 Torrenting is decentralized file sharing. Now, downloading co...
Yarrgh!
media piracy is illegal, always comply with your local copyright laws ok so basically we have je...
Docker
Will be somewhere in your homelab. All roads lead back to Docker. It's the easiest setup of all t...
Pi-Hole
the infinite dns sinkhole. DNS is very very complicated. Actually, no it's not. Basically DNS map...
Intrusion Detection System
A hardware device designed to monitor and protect computer networks from suspicious, malicious, a...
Reconnaissance
Spy on the infidels! The goal of monitoring is to keep track of conditions on the network, iden...
Nessus
A proprietary vulnerability scanner developed by Tenable.
Sn1per
An automated scanner that can be used to enumerate and search for specific vulnerabilities. Sn1p...
Scanless
A method of port scanning that uses publicly available exploitation detection sites to preserve a...
Dnsenum
A reconnaissance tool that performs DNS enumeration, and can find records and entries for a speci...
theHarvester
A passive reconnaissance tool. theHarvester is used to gather information from a variety of publ...
Shodan
A popular search engine for IoT devices. Users are able to search for specific types off devices...
OSINT
Open Source Intelligence A collection of resources and tools that are separated by common catego...
Physical Security
Lock the aliens out! Physical security is the first line of defense when it comes to physical ac...