Make SQL Injection Vulnerabilities Harder to Exploit


Get an Alert when Someone Accesses a File

What are Canaries?


How Hackers Clone Sites and Create Malicious Login Pages

Cloning our Target Login Page


A Proof of Concept Python Virus


And an Example Showing Memory Injection

Windows API Functions for Process Manipulation


Windows Registry = Digital Forensics Gold Mine

What is the Windows Registry?


The Malware Used in the Trojanized SolarWinds Orion Update

The SolarWind’s Supply Chain Attack


Exploiting an 802.11 Flaw

How does a Deauthentication Attack Work?


Creating new Tor identities to confidently and safely browse the Dark Web


2020 Setup

Make a Backup of Current Sources.list File

mv /etc/apt/sources.list /etc/apt/sources.list.bak

Remove currently installed Kali Updates

Alexis Rodriguez

Pythonista & Gopher | <OSCP> <CySA+> <Security+> | Part-time Cybersecurity Instructional Associate @ Fullstack Academy

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store