top of page


Infostealer Malware Explained: How It Works, Real-World Examples, and How to Stay Safe
Discover what infostealer malware is, how it operates, real-life examples like RedLine, Vidar, and Raccoon Stealer, and learn effective cybersecurity measures to protect your sensitive data.
May 284 min read


Security Onion SIEM Setup
Security Onion SIEM setup guide.
Network security monitoring, intrusion detection, and log management
May 133 min read


Wazuh XDR setup on Proxmox virtual machine
This guide will show you how to setup a Wazuh on a home proxmox server and connect your Windows clients for security monitoring.
Apr 285 min read


Network Troubleshooting using the OSI Model
Network troubleshooting using the OSI model involves identifying and resolving issues at each layer of the OSI model.
Apr 24 min read


Using PowerShell for Security Investigations
This guide outlines how to use PowerShell effectively for blue team security testing.
Mar 124 min read


Google Dorks - Advanced Search
Explore what Google dorks are, how to use them effectively, and provide real-world examples for practical use.
Feb 23 min read


Wazuh SIEM & XDR setup on Azure Linux virtual machine
This guide will show you how to setup a Wazuh server in Azure and connect your Windows clients for security monitoring within the Azure host
Jan 85 min read


Introduction to the NIST cybersecurity framework (CSF)
The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely adopted set of guidelines designed to...
Dec 29, 20245 min read


ZIP File password cracking
Learn how to recover forgotten ZIP file passwords with fcrackzip. This guide covers installation, syntax, and best practices.
Dec 23, 20245 min read
bottom of page



