Penetration Testing

Getting the Most Value Out of the OSCP: The Exam
A practical guide to maximizing the short- and long-term benefits of your upcoming OSCP exam attempt(s).Disclaimer:All opinions expressed in this article are solely my own. I have reviewed the content to ensure ...

Your Go-To Web Application Pentesting Checklist
Web applications are integral to modern business operations, facilitating customer engagement, financial transactions, and internal processes. However, their widespread use and complexity make them prime targets for cyber threats. A... The post ...

The Web application Penetration Testing Tools That Actually Works
If your website handles any kind of user data, chances are it’s being watched. And not just by customers. Hackers, too. That’s why web application penetration testing tools is no... The post ...

RFID Hacking: Exploring Vulnerabilities, Testing Methods, and Protection Strategies
Radio-Frequency Identification (RFID) technology is everywhere—powering everything from contactless payments and inventory tracking to access control systems. But while RFID systems makes life more convenient, it also introduces serious security... The post ...

Getting the Most Value Out of the OSCP: The PEN-200 Labs
How to leverage the PEN-200 simulated black-box penetration testing scenarios for maximal self-improvement and career success.Disclaimer:All opinions expressed in this article are solely my own. I have reviewed the content to ensure compliance ...

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...

Getting the Most Value Out of the OSCP: The PEN-200 Course
In this second post of a five-part series, I provide advice on how to best utilize the PEN-200 course material for a successful career in ethical hacking.Disclaimer:All opinions expressed in this article are ...
Build Your AI-Powered Penetration Testing Scheme with DeepSeek + Agent: An NSFOCUS Practice
Dilemma of Traditional Automated Penetration Testing Penetration testing has always been the core means of offensive and defensive confrontation for cybersecurity. However, traditional automatic penetration tools face three major bottlenecks: lack of ...

SlackPirate Set Sails Again! Or: How to Send the Entire “Bee Movie” Script to Your Friends in Slack
TLDR: SlackPirate has been defunct for a few years due to a breaking change in how the Slack client interacts with the Slack API. It has a new PR by yours truly ...