PinnedAdvanced Phishing Unveiled: Mastering Evilginx 3 for Robust AD FS and MFA Securityn phishing simulations and real-world attacks, understanding the intricacies of AD FS and MFA is critical. Attackers using advanced tools…Dec 6, 20232Dec 6, 20232
PinnedHow to Create Phishlets for Evilginx3 & MITM Ransomware Phishing EngagementsHow I code Phishlets for Evilginx engagements likea pro.Dec 2, 20231Dec 2, 20231
The Ultimate Guide to Password Spraying Tools for Hackers & Penetration Testers (+ Password…Password spraying is pretty important and continues to be a key technique in offensive security.Aug 18Aug 18
Hacking .ZIP and .MOV Top-Level Domains for Advanced Browser-Based Secret Ransomware AttacksContext:Jun 8Jun 8
How to Steal Okta Administrator Tokens with Modlishka and Reverse-Proxy Phishing MasteryEvilProxy, Modlishka, Evilginx, EvilGoPhish are all powerful reverse-proxy phishing kits for bypassing modern MFA thru Cookie Stealing.May 29May 29
Link Manipulation & Domination: How Hackers Trick Billionaire Executives into Downloading…Advanced Link Manipulation Techniques: Unveiling the Hidden DangersMay 20May 20
How to Crack Any Modern Password with AI & Deep-Learning in under 60 minutesWith all of the articles I write and the long courses I make, I always try to explain the context of whatever we are doing/learning. So…May 111May 111
Bypassing Email Authentication in 2024: Strategies for Red Teams and Penetration Testers Facing…So in 2024, Gmail and Yahoo introduced new email protocols aimed at enhancing web security and reducing spam and phishing and such.Mar 12Mar 12
What the Mercedes-Benz Hack means for the security of AI & Self-Driving CarsMercedes-Benz recently suffered a data breach that exposed internal source code and other proprietary information after an employee…Jan 30Jan 30
Comparing Nvidia RTX Series, Laptops, & best GPUs for Hacking + CybersecurityI recently have been doing a lot of hashing with my Nvidia GPU recently. Being in this industry made me look a little deeper into the main…Jan 1Jan 1