
How To Use This Site
A Repo for Cluttered Minds. Use each card as a review topic for notebooks. Topics Covered --- Threat Hunting Forensics Cloud Active Directory Appsec Stuff Radio Other Projects --- Threat Hun...
A Repo for Cluttered Minds. Use each card as a review topic for notebooks. Topics Covered --- Threat Hunting Forensics Cloud Active Directory Appsec Stuff Radio Other Projects --- Threat Hun...
Baofeng Menu Reference This is documentation for how to use a Baofeng Radio. I am using a UV-5R8W. Many far more technical and qualified people have done extensive tutorials, so you should check...
Small Book 1 Formal Titles: Threat Detection Forensics Enterprise Security Security Engineering Web Aoo Pentesting/Bug Bounties Email Research Radio/WiFi SCADA Satellites/Deepspace REGEX (\S)(M)...
Forests, Trees, and Domains [Screenshot of AD] Active Directory’s Logical Divisions Domains: Group of network objects (ex.) with the same Active Directory database Tree: a group of domains...
rex field = System_Props_XML (\S)(HTTP)(\s) (\S \s) (?\SM)"
duffle bag for pen test Raw Notes Raw Notes 1 Recon nmap scan reveals two open ports Port Status Info 80 open http (web applicatio...
Raw Notes Raw Notes 1 Raw Notes 2 Raw Notes 3 Raw Notes 4 Tutorials Used https://github.com/weslambert/velociraptor-docker Ironcailly this had nothing to do with docker initially Setup E...
Annotations and quick copy-pastes for MemprocFS, based on 13Cubed’s tutorial. I don’t see a whole lot of other people using this tool but it has been useful so I guess here we are. TLDR SpeedRun C...
Annotations of various tutorials on starting out in Volatility, a python-based tool for Host-Based Forensics and Incident Responders. This tool is for digital investigation, and requires the reposi...
On The Nature of Tarnished Souls You may have come here from my art site. This is a documentation as well of the pages of this tome Eileen The Crow Pages Shop