Learn Ethical Hacking
nmap -sC -sV --script vuln,vulners --script-args mincvss=7.0 -p5432,5433 -Pn 10.10.10.10 #make sure to check for vulnerable versions Brute...
LDAP - Port 389 or LDAP SSL on Port 636 Nmap Scan map -n -sV --script "ldap* and not brute" -p389,636,3268,3269 10.10.10.10 nma...
DeepSeek, a groundbreaking Chinese artificial intelligence (AI) company founded in 2023 by Liang Wenfeng and headquartered in Hangzhou, Zhej...
Explore a step-by-step guide to Android APK penetration testing! This blog covers essential techniques such as decompiling APKs, analyzing A...
Understanding PE Headers: A Complete Guide to the Windows Portable Executable Format
January 05, 2025Introduction The Portable Executable (PE) format is an essential structure for Windows binaries such as executables (EXE) and dynamic lin...
Jenkins Penetration Testing Cheatsheet Jenkins is one of the most widely used open-source automation servers, empowering teams to build, te...
Cheat Sheets
Learn Hacking Wifi Networks
Search for a Post
Recent Posts
Popular Posts
In this blog post, we will share with you a comprehensive cheatsheet...
Feb 06 2024 | Read moreIn lot of scenarios, we usually don't have access to GUI access...
Feb 06 2024 | Read moreIn the fast-paced world of artificial intelligence and machine...
Feb 01 2024 | Read moreBefore getting into the Attacking and Exploitation, it is...
Aug 11 2023 | Read moreHello all, This is a simple cheat sheet for Hacking/Pentesting...
Aug 02 2022 | Read moreHere is another continuation of Active Directory Penetration...
Sep 01 2021 | Read moreHello Readers, Welcome to Hacking Dream. Today' post is on...
May 14 2021 | Read moreHello Everyone, I am back after a long time. Today' post is on Active...
Apr 03 2021 | Read moreHello everyone, below are the Linux Privilege Escalation...
Mar 09 2020 | Read moreHello Everyone, here is the windows privilege escalation...
Mar 07 2020 | Read more