Make SQL Injection Vulnerabilities Harder to Exploit

Get an Alert when Someone Accesses a File

What are Canaries?

How Hackers Clone Sites and Create Malicious Login Pages

Cloning our Target Login Page

A Proof of Concept Python Virus

And an Example Showing Memory Injection

Windows API Functions for Process Manipulation

Windows Registry = Digital Forensics Gold Mine

What is the Windows Registry?

The Malware Used in the Trojanized SolarWinds Orion Update

The SolarWind’s Supply Chain Attack

Exploiting an 802.11 Flaw

How does a Deauthentication Attack Work?

Creating new Tor identities to confidently and safely browse the Dark Web

2020 Setup

Make a Backup of Current Sources.list File

mv /etc/apt/sources.list /etc/apt/sources.list.bak

Remove currently installed Kali Updates

Alexis Rodriguez

Pythonista & Gopher | <OSCP> <CySA+> <Security+> | Part-time Cybersecurity Instructional Associate @ Fullstack Academy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store