
Free Active Directory Security Tools
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.
If you are not using these free tools to secure Active Directory, then you’re an easy target! Find the vulnerabilities lurking in your Active Directory environment before the attackers do.
How to audit and better secure Active Directory passwords. The latest updates to enterprise password policy and best practices. Tips on how you can stay up to date on breaches.
How you can create fun and engaging cybersecurity tabletop exercises at your organization. Fulfill compliance requirements for tabletop exercises or security awareness training with the provided documents.
The top tools and news sources you need to know if you are in cybersecurity. Don’t get caught off guard by an attack!
Dive into the IT professional’s nomadic journey—conquering ergonomic hurdles and fortifying digital defenses. Uncover essential tips for a seamless blend of work, travel, and security. Your IT adventure begins here!
A walk-through for the Let’s Defend DFIR Remote Code Execution challenge. A forensic investigation with Obfuscated PowerShell, reverse shells, and web shells.
My review of Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker, is Kevin Mitnick’s autobiography.
My review of “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. TLDR: Its a must-read.
Learn how to make your own Bash code obfuscated backdoor to hide in Linux systems.
Learn how to build obfuscated Bash backdoors with some help from ChatGPT. Can Hackers use ChatGPT to build them the Bash malware they need? Find out in this blog post.
Are you planning on attending DEF CON 31? Check out my guide if this will be your first DEF CON. The helpful tips you need to maximize your DEF CON 31 experience.
Find out what you need to know to defend against the KeePass vulnerability CVE-2023-32784!
How to deobfuscate malicious PowerShell using a real-world example. Learn what you need to know now before an incident occurs!