BloodHound

SharpHound collects Active Directory data, mapping relationships and permissions, while BloodHound analyzes this data to reveal attack paths and privilege escalation opportunities.…

[Read more]

Chisel Forwarding

This guide provides step-by-step instructions on how to set up and use Chisel for tunneling traffic and accessing remote services. It also covers how to configure proxychains to…

[Read more]

Nmap Scanning

Nmap is a versatile tool used for network discovery, scanning, and security auditing. It allows you to combine multiple options in a single command to perform various tasks…

[Read more]