Blog

Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec

Welcome back, aspiring cyberwarriors!   In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging to combat the growing sophistication of cyber threats. One such innovative solution is CrowdSec, a free and open-source security automation tool that leverages the power of crowdsourcing to detect and mitigate cyber attacks. This article delves into […]

Continue Reading

Open-Source Intelligence(OSINT): Sherlock – The Ultimate Username Enumeration Tool

Welcome back, aspiring OSINT investigators!   Social media platforms hold a wealth of personal and professional information, making them valuable for reconnaissance in penetration testing and cyberwarfare operations. Sherlock is a lightweight yet powerful tool designed to search for social media profiles using a username. In this article, we’ll guide you through installing and using […]

Continue Reading

Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2

Welcome back, aspiring cyberwarriors!   During reconnaissance, our goal is to identify vulnerable services within our target’s network. To streamline this process, CVEScannerV2 was developed – a powerful Nmap script that bridges the gap between network scanning and vulnerability assessment. This tool enhances the capabilities of the widely-used Nmap scanner, offering security professionals a comprehensive […]

Continue Reading

Open Source Intelligence (OSINT): The Versatile Email Address Search Tool

Welcome back, aspiring cyberwarriors and OSINT investigators! In our digital age, email addresses have become the keys to our online identities. They’re used for everything from social media accounts to financial services, making them prime targets for hackers.  As OSINT investigators, pentesters, and hackers, we often need to determine if a target’s email address has […]

Continue Reading