Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server)
In this post, I am gonna introduce to you a very interesting project called WebVM. This project is a real “black technology”. It allows user to run a full functional…
Learning, Sharing, Creating
In this post, I am gonna introduce to you a very interesting project called WebVM. This project is a real “black technology”. It allows user to run a full functional…
Footprinting is the first step in the evaluation of the security posture of the IT infrastructure of a target organization. Through footprinting and reconnaissance, one can gather maximum information about…
UnderDefense is a cybersecurity company that offers services to help businesses protect against cyber threats. UnderDefense MAXI A security-as-a-service platform that integrates with a business’s security infrastructure. It includes threat…
The following steps is only used for a selected environment to have a simplified deployments which is to target bringing MDE to all devices as fast as we can (in…
The Chief Information Security Office (CISO) or vCISO workshop helps accelerate security program modernization with reference strategies built using Zero Trust principles. The workshop covers all aspects of a comprehensive…
Tailscale is a modern VPN solution that simplifies secure networking by creating private, encrypted connections between devices, no matter where they are located. Built on the WireGuard protocol, Tailscale enables…
Microsoft Defender for Endpoint is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. Defender for Endpoint provides advanced threat protection…
This post is used to show SentinelOne Console scrrenshots for future reference.
Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing.Maintained and funded by Offensive Security . Kali Linux has about 600 built-inPenetration testing programs (tools), including…
This post shows you how to deploy zfile using Docker. It demonstrates the steps deploying to online cloud providers such as fly.io, Zeahur, Koyeb, .
List some verified services which can be installed on Serv00.
A single user couldn’t log in via Multi-Factor Authentication. SMS code would say it was sent, wouldn’t come through. Phone call also wouldn’t come through. Trying to set up another…