Posts

16/06/25

Quick Guide — Deploy Kali with Vagrant

Create a Kali VM in an instant with the help of Vagrant.

Read More

03/04/25

Nmap — The Network Mapper

Learn how to use Nmap to discover live hosts on the network and potentially vulnerable running services. Nmap is one of the most fundamental tools you need in cybersecurity.

Read More

27/02/25

Deploying Metasploitable

To learn and practice pentesting, we need something to attack and experiment with. Let's see how to deploy Metasploitable, an intentionally vulnerable machine where we can safely develop our skills.

Read More