Search
TOOLS DON'T MAKE HACKERS, HACKERS MAKE TOOLS. An info sec junkie's professional path. Professional pentester and Red Teamer since October 2018. I love hacking and coding and I hope I can give my little knowledge back to the community and help make information systems more secure. This blog focuses on information security and white hat hacking, i.e. hacking based on the client's authorization. Hacking must be done responsibly: don't ruin people's lives and businesses.
Posts
Showing posts from December, 2017
Contact Form
Merry Christmas to all my readers, LinkedIn connections, Twitter followers, Peerlysters and Quorans
- Get link
- X
- Other Apps
PeerTalk: Moving to an Information Security career
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 48: Web application pentesting
- Get link
- X
- Other Apps
Looking for volunteering and learning opportunities
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 47: Post-exploitation (pt. 3)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 46: Post-exploitation (pt. 2)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 45: Post-exploitation (pt. 1)
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 44: AV Evasion (pt 2)
- Get link
- X
- Other Apps
Clone and resize a VirtualBox Windows virtual machine keeping its activation
- Get link
- X
- Other Apps
Tips for an Information Security Analyst/Pentester career - Ep. 43: AV Evasion (pt.1)
- Get link
- X
- Other Apps