Security Recon to Root

Learn about the hacker methodology. See how Pentester Jarrod Rizor goes about doing an external pentest from recon to enumeration to exploitation using various linux tools and techniques. Live Demo of exploiting a linux box and cracking WPA2 PSK. read more

Terminal Based Development

Shaun McFee presented how to create an effective terminal based development environment using tmux and related tools. read more

2022-03-31 - Linux and Android

2022-02-24 - What's on G's mind?

2022-01-27 - Getting Started with Proxmox VE

All articles