FFUF 2.0

FFUF 2.0 has been released and is now available, according to the Joo N/A Twitter handle. You can find it on the following GitHub link: https://github.com/ffuf/ffuf. FFuf (Fuzz Faster U Fool) is a fast web fuzzing tool that can be used for both information gathering and vulnerability testing in the field of cybersecurity. It allows… Continue reading

Top Threat Hunting and OSINT Tools

A list of essential cybersecurity tools, shared on Twitter 1/02/23, by @NandadLohitasksh’s, provides valuable insights for all skill levels. A comprehensive overview of current tools in the industry. Recommended resource for professionals, students and enthusiasts. shodan.io – Search for devices connected to the internet and their vulnerabilities prowl.lupovis.io – Free IP search & identifications of IoC and… Continue reading

Midjourney AI generated Images

Midjourney AI is an intriguing technology that has generated some fascinating images. I have been following its progress and development, and I am eager to see how it will evolve in the coming years. As technology continues to advance, it is always exciting to observe the latest innovations and advancements. In this case, I am… Continue reading

Midjourney Prompts

Midjourney is an artificial intelligence art generation service. They are an  AI-powered system that creates images from user prompts. On their website, they describe themselves as: “An independent research lab. Exploring new mediums of thought. Expanding the imaginative powers of the human species.” Some Prompts that you can use to help generate some of the images… Continue reading

@davidbombal

David Bombal is a well-known figure in the cybersecurity industry, known for his expertise in network automation and his contributions to the field of network engineering. He is an experienced network engineer and instructor who has designed and delivered numerous training courses and workshops on network automation, network programmability, and network security. David Bombal has… Continue reading

Linux PrivEsc Methodology Mind Map

Privilege escalation in cybersecurity refers to the act of gaining unauthorized access to higher-level privileges on a computer system or network. It is a type of attack that occurs when an attacker gains access to a low-level account on a system and then uses that access to gain higher-level, root privileges. Many thanks to @conda… Continue reading

Windows PrivEsc Methodology Mind Map

Privilege escalation in cybersecurity refers to the act of gaining unauthorized access to higher-level privileges on a computer system or network. It is a type of attack that occurs when an attacker gains access to a low-level account on a system and then uses that access to gain higher-level, administrator privileges. Many thanks to @conda… Continue reading

Upgrading shell to an interactive TTY Shell

The command python -c ‘import pty; pty.spawn(“/bin/bash”)’ is a command that is used to spawn a new TTY (teletypewriter) shell using the pty module in Python. This command is useful in situations where you have compromised and got a shell on a target machine, but the shell is not interactive. In this case, using this… Continue reading

@nahamsec

@nahamsec is a well-known and respected figure in the cybersecurity and penetration testing community. He is known for his expertise in the field of bug bounties and has successfully found and reported vulnerabilities in a number of high-profile companies. In addition to his technical skills, @nahamsec is also known for his willingness to share his… Continue reading

@Tomnomnom

Tomnomnom, also known by his online handle @tomnomnom, is a well-known and respected figure in the cybersecurity community. He is a security researcher and tool developer, known for his contributions to the open-source community and for his focus on web and infrastructure security. Tomnomnom’s work primarily revolves around developing and sharing tools that can be… Continue reading

ISA/IEC 62443 Cybersecurity expert program

The ISA/IEC 62443 cybersecurity expert program is a certification program for individuals who have demonstrated expertise in the design, implementation, and maintenance of industrial control systems security. The program is based on the ISA/IEC 62443 series of standards, which provide guidelines for securing industrial control systems. The program is offered by the International Society of… Continue reading