Testing the New CMS
A quick test to ensure the Unified Content Management system is working correctly across all pages.
The Death of Traditional Passwords
A beginner-friendly walkthrough explaining the transition from traditional passwords to passkeys, focusing on their security benefits and adoption challenges.
Python-venv
Creation of lightweight 'virtual environments' for Python.
Nuclei
Template based vulnerability scanner.
Virtualbox
Powerful x86 and AMD64/Intel64 virtualization product.
Socat
Multipurpose relay (SOcket CAT).
Wfuzz
Web application bruteforcer.
Sshuttle
Transparent proxy server that works as a poor man's VPN.
Tcpdump
Packet analyzer.
Winpeas
Windows Privilege Escalation Awesome Scripts.
Sqlmap
The primary tool for detecting and exploiting SQL injection flaws.
Metasploit
The world's most used penetration testing framework.
Evil-winrm
The ultimate WinRM shell for hacking/pentesting.
Wazuh
The Open Source Security Platform (SIEM/XDR).
Tmux
Terminal multiplexer.
Kubernetes
Container orchestration system.
Hashcat
World's fastest password cracker.
Commix
Automated All-in-One OS command injection exploitation tool.
Linpeas
Linux Privilege Escalation Awesome Script.
Bloodhound
Six Degrees of Domain Admin.
Nikto
Classic web server scanner.
Gh
GitHub’s official command line tool.
Impacket
Collection of Python classes for working with network protocols.
Proxychains
Redirect connections through proxy servers.
Netcat
The TCP/IP Swiss Army Knife.
Wpscan
WordPress vulnerability scanner.
Chisel
Fast TCP/UDP tunnel over HTTP.
Responder
LLMNR/NBT-NS Poisoner.
Nmap
The most popular network scanner.
Gobuster
Fast directory/file & DNS busting tool.
Ffuf
Fast web fuzzer written in Go.
John
John the Ripper password cracker.
Hydra
Parallelized login cracker.
Sniper
Automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.
Amass
In-depth Attack Surface Mapping and Asset Discovery.
Netexec
The Swiss Army Knife of pentesting networks (formerly CrackMapExec).
Msfvenom
Metasploit standalone payload generator.
Searchsploit
Command line search tool for Exploit-DB.
Dirbuster
Legacy Java directory brute forcer.
Sublist3r
Fast subdomains enumeration tool for penetration testers.
Wireshark
The world's foremost network protocol analyzer.
Docker
Platform for developing, shipping, and running applications in containers.
Wapiti
Web application vulnerability scanner.
Burpsuite
Web vulnerability scanner and proxy.
Dirbuster
This detailed walkthrough guides entry-level cybersecurity students through the effective use of DirBuster, a powerful tool for discovering hidden directories and files on web servers. We'll cover fundamental commands, advanced options like multithreading and recursion, filtering results, using proxies, and custom user-agents, culminating in building a comprehensive scanning strategy.
Python-venv Command List
Top 10 essential commands for python-venv.
Nuclei Command List
Top 10 essential commands and a master guide for using Nuclei in penetration testing.
Waybackurls Command List
Top 10 essential commands and a master guide for using Waybackurls in penetration testing.
Socat Command List
Top 10 essential commands for socat.
Wfuzz Command List
Top 10 essential commands and a master guide for using Wfuzz in penetration testing.
Sshuttle Command List
Top 10 essential commands for sshuttle.
Gospider Command List
Top 10 essential commands and a master guide for using Gospider in penetration testing.
Tcpdump Command List
Top 10 essential commands for tcpdump.
Winpeas Command List
Top 10 essential commands for winpeas.
Sqlmap Command List
Top 10 essential commands for sqlmap.
Metasploit Command List
Top 10 essential commands for metasploit.
Evil-winrm Command List
Top 10 essential commands for evil-winrm.
Katana Command List
Top 10 essential commands and a master guide for using Katana in penetration testing.
Findomain Command List
Top 10 essential commands and a master guide for using Findomain in penetration testing.
Wazuh Command List
Top 10 essential commands for wazuh.
Tmux Command List
Top 10 essential commands for tmux.
Kubernetes Command List
Top 10 essential commands for kubernetes.
Hashcat Command List
Top 10 essential commands for hashcat.
Commix Command List
Top 10 essential commands for commix.
Linpeas Command List
Top 10 essential commands for linpeas.
Bloodhound Command List
Top 10 essential commands for bloodhound.
Nikto Command List
Top 10 essential commands and a master guide for using Nikto in penetration testing.
Gh Command List
Top 10 essential commands for gh.
Impacket Command List
Top 10 essential commands for impacket.
Proxychains Command List
Top 10 essential commands for proxychains.
Netcat Command List
Top 10 essential commands for netcat.
Wpscan Command List
Top 10 essential commands and a master guide for using Wpscan in penetration testing.
Chisel Command List
Top 10 essential commands for chisel.
Spiderfoot Command List
Top 10 essential commands and a master guide for using Spiderfoot in penetration testing.
Responder Command List
Top 10 essential commands for responder.
Knockpy Command List
Top 10 essential commands and a master guide for using Knockpy in penetration testing.
Nmap Command List
Top 10 essential commands and a master guide for using Nmap in penetration testing.
Example Command: Tar
This detailed walkthrough introduces the essential Linux `tar` command, a powerful utility for archiving and compressing files and directories. We will learn how to create compressed archives and extract their contents, with clear explanations of each flag and practical use cases for entry-level cybersecurity students.
Gobuster Command List
A comprehensive guide to using Gobuster for web content discovery and enumeration, designed for entry-level cybersecurity students.
Assetfinder Command List
Top 10 essential commands and a master guide for using Assetfinder in penetration testing.
Ffuf Command List
Top 10 essential commands and a master guide for using Ffuf in penetration testing.
John Command List
Top 10 essential commands for john.
Hydra Command List
Top 10 essential commands and a master guide for using Hydra in penetration testing.
Sniper Command List
Top 10 essential commands for sniper.
Feroxbuster Command List
Top 10 essential commands and a master guide for using Feroxbuster in penetration testing.
Gowitness Command List
Top 10 essential commands and a master guide for using Gowitness in penetration testing.
Amass Command List
Top 10 essential commands and a master guide for using Amass in penetration testing.
Netexec Command List
Top 10 essential commands for netexec.
Dirsearch Command List
Top 10 essential commands and a master guide for using Dirsearch in penetration testing.
Sn1Per Command List
Top 10 essential commands and a master guide for using Sn1Per in penetration testing.
Msfvenom Command List
Top 10 essential commands for msfvenom.
Searchsploit Command List
Top 10 essential commands for searchsploit.
Dirbuster Command List
A comprehensive educational walkthrough of using Dirbuster for web directory enumeration in cybersecurity, tailored for beginners.
Sublist3R Command List
Top 10 essential commands and a master guide for using Sublist3R in penetration testing.
Recon-Ng Command List
Top 10 essential commands and a master guide for using Recon-Ng in penetration testing.
Finalrecon Command List
Top 10 essential commands and a master guide for using Finalrecon in penetration testing.
Wireshark Command List
Top 10 essential commands for wireshark.
Docker Command List
Top 10 essential commands for docker.
Chaos Command List
Top 10 essential commands and a master guide for using Chaos in penetration testing.
Wapiti Command List
Top 10 essential commands and a master guide for using Wapiti in penetration testing.
Hakrawler Command List
Top 10 essential commands and a master guide for using Hakrawler in penetration testing.
Gobuster
A detailed walkthrough of a simulated cybersecurity engagement, covering reconnaissance, enumeration, and exploitation using tools like Gobuster. Designed for entry-level students to understand practical hacking techniques.
WordPress Command List
A detailed, beginner-friendly walkthrough on using Nmap and WPScan for web application reconnaissance and enumeration, focusing on WordPress security.
Example Doc: API V1
A beginner-friendly walkthrough of a simulated web application penetration test, covering reconnaissance, enumeration of web services and APIs, and exploitation to gain initial access and escalate privileges.
Example Test: Login Flow
A detailed walkthrough of a login flow security test, focusing on identifying and explaining vulnerabilities like missing rate limiting for entry-level cybersecurity students.