CISCO Security 3
Active Directory Lab 10
- 1. Downloading Images & VMware Setup
- 2. Creating Virtual Machines
- 3. Domain Controller Installation
- 4. Active Directory Configuration
- 5. Creating OUs and Domain Admins
- 6. Configuring DHCP Server
- Coming Soon 7. File Server Configuration
- Coming Soon 8. NAT Configuration
- Coming Soon 9. Windows 10 Installation
- Coming Soon 10. Joining Domain
Python Fundamentals 15
Python Advanced 4
Python Projects 8
Docker & Swarm 3
Kubernetes 5
General Guides 5
External Resources
Curated list of useful cybersecurity tools and resources
- MalAPI - Malware Evasion API
- Hash Identifier Tool
- Hash Lookup Database
- GTFOBins
- Unprotect Project - Evasion Techniques
- Threatcops - OSINT Tools
- Revshells - Reverse Shell Generator
- Enigmator - Decryption Tools
- SQLi Payload List
- Linux Journey - Learn Linux
- CyberChef - Encode/Decrypt Tool
- OSI Explain - Interactive OSI Model Guide
CTF Challenges
I have created 15 Capture The Flag (CTF) style vulnerable virtual machines for penetration testing practice. These VMs range from beginner to advanced difficulty.
⚠️ Warning: NEVER deploy these vulnerable systems in a production environment. They are intentionally insecure for educational purposes only.
Interested? Email me for instructions and download links!
Get In Touch
Have questions, suggestions, or want to request a guide?
Email: [email protected]