Simplifying Server & Deployment Management with Komodo
Simplifying Server & Deployment Management with KomodoIntroductionKomodo offers a unified platform for managing servers and automated deployments, making server management simpler and more streamlined. Unlike Portainer, Komodo is free and open-source, making it ideal for home labs and small businesses. While it lacks some advanced features like identity/access management and Kubernetes support, it excels in managing Docker-based environments. What’s Komodo All About?At its core,...
Build a Serverless Web App on AWS
IntroductionServerless architecture eliminates the need for infrastructure management, allowing developers to focus on code rather than servers. In this guide, we will walk through the process of building a serverless web application using AWS services. What is Serverless Architecture?Serverless architecture allows applications to run without provisioning or managing servers. AWS provides services like: AWS Lambda for executing backend logic. Amazon API Gateway for handling HTTP...
Ethical Hacking Assignment | SME Network Penetration Testing
IntroductionDuring the COVID-19 pandemic, many organizations faced cybersecurity challenges as they quickly adapted to remote work environments. “Tech Skibidi Inc.“, a medium-sized IT support and software development company, encountered vulnerabilities due to rapid technology deployment and insufficient security measures. This project aims to assess and strengthen their security posture through penetration testing and real-world attack simulations. Objectives Identify vulnerabilities within...
Dynamic Malware Analysis
IntroductionDynamic malware analysis is a crucial technique for understanding the behavior of malicious software in a controlled environment. By observing how malware executes and interacts with its host system, we can uncover hidden functionalities, identify affected files and processes, and better prepare countermeasures. Watch the introduction to dynamic malware analysis here: Dynamic Malware AnalysisDynamic malware analysis involves running the malware in a secure environment to observe...
Hexo Cheatsheet
Hexo CheatsheetI created this cheatsheet to provide a quick and easy reference for Hexo commands. Whether you’re just getting started with Hexo or are an experienced user, this guide will help you navigate the essential commands for installation, post management, deployment, and server setup. The goal is to simplify your workflow and reduce the time spent searching for the right command. Installation123npm install hexo -g # Install Hexo globallynpm update hexo -g # Update Hexo...
Sliver-C2 Basic
Sliver is an Open-Source Command and Control (C2) framework often used in penetration testing and red team operations. It offers robust features to deploy, manage, and interact with listener agents and payloads. Installation of SliverRequirement for Sliver C2 is linux OS Sliver Installation 1curl https://sliver.sh/install | sudo bash Running Sliver 1sliver If Sliver process either hangs or inaccessable due to previous usage, use this command to restart you sliver process 1sudo systemctl...
Basic Static and Dynamic Analysis cheatsheet
This cheatsheet is not indepth and detailed. It will only cover the required minimumMight make a more indepth version when required. Basic Static Analysis Malware Fingerprint AV Scanning Hashing VirusTotal Finding String in Malware Representation of Strings ASCII (1 Byte), Hexadecimal Unicode (2 Bytes) BinText: String Extraction Tool Portable Executable Format Source to Execution Compiler: Translates high-level code to machine code Linker: Links .obj files into a single .exe...