Publications
🌟 It took me a while to share this with you all - but here it is. I have created a ethical hacking course and it is available on CodeRed learning platform 😊 Lot's of practical stuff, just the essen...
🦜 Since a couple of weeks, I've really started liking the in-browser streaming solutions, like Pwnbox from Hack The Box and Parrot Security. I've written several scripts that set your environment e...
🍑 First comprehensive guide on running Kasm Workspaces on the #Raspberry Pi! Kasm Workspaces from Kasm Technologies is a way of running isolated #Docker instances that are streamed in your browser ...
🎇 Summary for 2021 is completed! It took me a little over a week to collect and compose everything that was happening around CyberEthical.Me. Do jump in and for the first time I'm asking you to do ...
🌲 "The work is going well on Santa's toy workshop but we lost contact with the manager in charge! We suspect the evil elves have taken over the workshop, can you talk to the worker elves and find o...
🐏 Linux Privilege Escalation is a one of the last rooms on TryHackMe on the Beginner Path. Read about what I've managed to learn from the sudo part of this exercise. 🔗 https://blog.cyberethical.me/...
🐣 Starting a new series where I'm presenting how you can safely grab the malicious code and by using various techniques like decompiling and deobfuscation to see what it is doing. In this series, y...