Penetration Testing
Batch scripting for Hackers
Jun 09, 2020 Penetration Testing

Batch Scripting for Hackers Chapter 1: Your First Batch Script Let's create your first Windows batch file. Open Notepad and follow along: What's different from Bash? Batch files end with or No need...

BASH scripting for hackers
Jun 08, 2020 Penetration Testing

Chapter 1: Your First Script Let's start with something simple. Open your terminal and follow along: What happened here? We created a file called We tried to run it, but got \"Permission denied\" We...

SSDLC - Security from the Ground Up
Apr 20, 2020 Penetration Testing

In an era where cyberattacks make headlines daily and data breaches can destroy companies overnight, treating security as an afterthought is no longer viable. Organizations that build security into...

Secure Software Development Life Cycle - SSDLC
Apr 07, 2020 Penetration Testing

What is Secure SDLC? Secure SDLC (Secure Software Development Life Cycle) is the practice of integrating security into every phase of the software development lifecycle — from planning to deployment...

Basic steps in Penetration Testing
Feb 28, 2020 Penetration Testing

Penetration Testing (PenTest) is a legal and authorized simulated cyberattack against a system to identify vulnerabilities before real attackers do. A proper penetration test follows a structured...

Building and Extending a PHP Web Shell
Feb 16, 2020 Penetration Testing

A web shell is a script that enables an attacker to gain remote control over a web server. It is especially useful for post exploitation tasks, allowing an attacker to execute arbitrary commands...

Build A Simple Web shell
Jan 03, 2020 Penetration Testing

A web shell is a type of code that hackers use to gain control over a web server. It is particularly useful for post exploitation attacks, and there are various types of web shells available. Some of...