Cybersecurity Resource Center

Instaloader: Downloading Instagram Profiles

Social Media is one of those things that we use on a daily basis, for better or for worse.
Instaloader: Downloading Instagram Profiles

WordPress Hacking with WPScan

WordPress is a popular website framework that allows people to create websites without having to know much about website development. Because of this, it’s easy for people to include vulnerable WordPress features within their websites.
WordPress Hacking with WPScan

WiFi Cracking with Aircrack-ng

These days, our home WiFi is something we all take for granted.
WiFi Cracking with Aircrack-ng

Malware Zoo: Playing with Ransomware

Wouldn’t it be nice to have a place where you can see how live malware would act on a computer system?
Malware Zoo: Playing with Ransomware

Phishing With ZPhisher

Phishing is a common way of getting sensitive information from a user.
Phishing With ZPhisher

Linux Privilege Escalation: Dirty Pipe

Linux is not having a great year when it comes to privilege escalation vulnerabilities.
Linux Privilege Escalation: Dirty Pipe

SprayKatz: Mimikatz with ProcDump

Let’s take a brief look at SprayKatz, a tool that will allow you to get password hashes on a Windows system without putting the actual Mimikatz binary on the Windows system!
SprayKatz: Mimikatz with ProcDump

Windows Lateral Movement: WMIC and its Deprecation

Let’s discuss the deprecation of the WMIC.exe binary when it comes to lateral movement in Windows systems!
Windows Lateral Movement: WMIC and its Deprecation

Microsoft Excel Hacking: Malicious Excel Macros

The question about how to send a payload to a user to execute is one that frequently arises.
Microsoft Excel Hacking: Malicious Excel Macros

Encrypted Shellcode: Advanced Metasploit Payloads

Attempting to use default payloads within Metasploit will usually result in the payload being caught by Windows Defender. Let’s get a little more advanced in our payload creation and add some shellcode and encryption into the mix!
Encrypted Shellcode: Advanced Metasploit Payloads