Author: x.z3r0

py7h0n_b4s1cs.py

INTRO TO PYTHON Python is one of the most popular and beginner friendly programming languages in the world. For starters, a vast majority of pentesting tools you will find on GitHub are written in python. Whether you’re hoping to automate boring tasks, scrape and analyze data, or start building and customizing your own tools, Python […]

cr0$$-s1t3-$cr1pt1ng.js

When I was in college around ’08 – ’09, I stumbled my way into becoming a freelance web designer. Like most millennials, I learned the basics of coding largely through MySpace and AngelFire. Pages would play your favorite emo song when people visited with fireworks or pink sparkles falling down the screen like glitter. You […]

c0ld-w4r-enem1es.h4ckt0r14

What is Hacktoria? I was recently introduced to a really cool website for OSINT, hacktoria.com. Hacktoria is a self-proclaimed story driven OSINT CTF. When you visit hacktoria.com, you will be taken to the page shown above. From here, you can choose the difficulty level for the CTF “contract” you’d like to do. You are playing […]

juliet.mp4

Hey guys and gals and everyone in between! I thought I’d post something a little different and fun today. So, rather than a hacking lesson, here is a really fun demonstration of the capabilities of AI. Click here to skip to the final product! It started with a TikTok comment. Lyrics Lets do it, I […]

pnpt.exe

—Overview— Recently, I took and passed the Practical Network Penetration Tester (PNPT) certification exam from TCM Security, which is sort of the next level up from the PJPT. The PNPT is an intermediate level ethical hacking certification that tests your skills in Active Directory, OSINT, login brute forcing, password guessing, lateral movement, pivoting, and privilege […]

netw0rking_0verview.txt

OSI Model of Networking The OSI (Open Systems Interconnection) model is a framework that explains how different systems communicate over a network. It was developed by the International Organization for Standardization (ISO) and consists of seven layers, each with specific functions and responsibilities. Each layer handles a different task in network communication and interacts with the […]

3thical_h4cker.meth0dology

Ethical hacking, also known as penetration testing, is a controlled simulation of a cybersecurity attack with the intent of identifying weaknesses in a client’s network security posture. Companies will hire an ethical hacker to penetrate their network so test their security practices, password policies, and even staff procedures, after which they will submit a report […]

pjpt.exe

After 4 grueling days of very little sleep, frustration, and fun, I was able to pass the PJPT exam! I was very nervous going in as its a practical exam meant to test your Active Directory hacking skills and I’m very new to the world of hacking and cybersecurity. After just 6 months, I went […]

Next Page »