Category: Uncategorized

  • Boston Penetration Testing

    As cyber threats continue to evolve and become more sophisticated, the city of Boston has recognized the need to enhance its cybersecurity measures. In response, Boston has launched the Boston Penetration Testing Initiative, a comprehensive program aimed at improving the cybersecurity posture of businesses and government entities across the city through rigorous penetration testing (pentesting)…

  • SSRF Cheatsheet: Comprehensive Guide

    Server-Side Request Forgery (SSRF) is a critical web application vulnerability that allows attackers to manipulate server-side requests. This SSRF cheatsheet provides an extensive collection of techniques to bypass security filters and exploit SSRF vulnerabilities. Whether you’re a penetration tester, security researcher, or developer, this guide will enhance your understanding of SSRF attacks and defenses. (Be…

  • Nmap Cheatsheet: Mastering Network Scanning

    The nmap cheatsheet is an indispensable resource for network administrators, security professionals, and ethical hackers. This comprehensive guide will walk you through the various features and techniques of nmap, empowering you to conduct thorough network reconnaissance and vulnerability assessments. 1.2 Why Use Nmap? Nmap is versatile, powerful, and constantly updated, making it essential for network…

  • RegreSSHion Ip Scanner Tool

    This is my RegreSSHion ip scanner written in GO. It can find single ip’s, cidr’s, ip’s from a file, and checks for different ports. This will be more effective than any Python written scanner simply because you can do concurrent scans against very long lists of ip’s, and hence, it’s much Quicker. I’ve already seen…

  • RegreSSHion Exploit

    After you’ve checked for RegreSSHion bug check on your servers openSSH protocol, (there is a list of vulnerable devices out there btw, over 2.5 million), be sure to check out this code exploit. (RegreSSHion Ip Scanner tool here ) Will this become the cve-2024-6387 exploit ? (Try it locally only!) RegreSSHion exploit code written in…

  • Chicago Penetration Testing

    From Windy City to Cyber Sentinel: Chicago’s Digital Security Renaissance Chicago, Illinois, known as the “Windy City,” has been quietly transforming into a burgeoning tech hub with a growing focus on cybersecurity. The city’s journey from an industrial and financial powerhouse to a dynamic tech ecosystem is a testament to its adaptability and innovative spirit.…

  • Golang Penetration Testing

    Internal network penetration testing is a crucial aspect of cybersecurity that helps organizations identify vulnerabilities within their internal network infrastructure. By simulating real-world attack scenarios, security professionals can uncover weaknesses and recommend appropriate mitigation strategies. Go (Golang) is an excellent language for network penetration testing due to its strong networking capabilities, concurrent programming model, and…

  • Goroutines GoMaxprocs

    Goroutines are a fundamental feature of Go (Golang) that enable concurrent execution. They are lightweight threads managed by the Go runtime, allowing developers to write concurrent programs with ease. Goroutines are more efficient than traditional operating system threads because they have a smaller memory footprint and can be created and destroyed more quickly. Key Concepts…

  • Austin Pentest: Natsec & Cyber

    Austin, Texas, often referred to as “Silicon Hills,” has emerged as a major technology hub in the United States. The city’s journey from a quiet college town to a bustling tech center is a testament to its innovative spirit and entrepreneurial ecosystem. The austin pentest initiative is now here to secure the city as a…