Showing posts with label Pentest. Show all posts
Showing posts with label Pentest. Show all posts

Kubernetes Penetration Testing: Complete 2026 Guide

Kubernetes Penetration Testing: Complete 2026 Guide Kubernetes Penetration Testing: Complete 2026 Guide Updated on January 21, 2026 ...

Windows PHP Web Shell & Reverse Shell Techniques

Windows Web Shell & Reverse Shell Techniques: Complete Guide Windows Web Shell & Reverse Shell Techniques: Complete Guide Updat...

PHP Web Shell and Reverse Shell Techniques for Linux: 45+ Methods for Penetration Testing

PHP Web Shell and Reverse Shell Techniques: 45+ Methods for Penetration Testing (2025) The Complete Guide to PHP Web Shell and Reverse Sh...

Pentesting Domain Controllers Cheatsheet

In this blog post, we will share with you a comprehensive cheatsheet for pentesting those powerful and critical domain controllers. Now, I k...

Web Penetration Testing with Curl Cheatsheet

  In lot of scenarios, we usually don't have access to GUI access to web applications but in most of the scenarios - you can find curl i...

Running your first Local LLM Model like ChatGPT without Coding

In the fast-paced world of artificial intelligence and machine learning, local LLM (Large Language Models) such as ChatGPT have revolutioniz...

Attacking and Pentesting VMWare ESXi Hosts

 Before getting into the Attacking and Exploitation, it is recommended to know the difference between vSphere, vCenter and ESXI/ESX hosts.  

Hacking and PenTesting Captive Portal Enabled Wireless Networks

 Hello all, This is a simple cheat sheet for Hacking/Pentesting Captive Portals Enabled Wireless/Wifi networks 

Relay Attacks - Active Directory Penetration Testing

  Here is another continuation of Active Directory Penetration Testing cheatsheet, this time - I am putting together few of the common relay...

Active Directory PenTest Cheat Sheet - Lateral Movement & Persistence Techniques

Hello Readers, Welcome to Hacking Dream. Today' post is on Active directory Penetration testing, this is a continuation of  ACTIVE DIREC...

Active Directory Penetration Testing Cheat Sheet - Recon & Initial Access

Hello Everyone, I am back after a long time. Today' post is on Active directory reconnaissance and gaining initial foot hold into the ta...

Linux Privilege Escalation Techniques

Hello everyone, below are the Linux Privilege Escalation Techniques. The below commands and techniques are the ones that I gathered when ...

Windows Privilege Escalation Cheatsheet for OSCP

Hello Everyone, here is the windows privilege escalation cheatsheet which I used to pass my OSCP certification. I am not a professional, ...

Linux Privilege Escalation Cheatsheet for OSCP

Hello Everyone,   below is the privilege escalation cheat sheet that I used to pass my OSCP certification. You can find lots of commands...

Linux 32-bit Binary Exploitation – Assembly Basics Part I

Hello Everyone, Welcome to a New series of Binary Exploitation, this is the first part of binary exploitation, there are gonna be many...