r3kind1e - Cybersecurity Insights and Penetration Testing

「The quieter you become, the more you are able to hear.」

VBA Macro Development - Part 2

VBA Macro Development - Part 2 Developer -> Macros -> Macros in: Document1 (document) Save as type: Word 97-2003 Document When you want to document to execute the macros, you need to create...

VBA Macro Development - Part 1

VBA Macro Development Demo: VBA Macro Development Options -> Customize Ribbon -> make sure that you have checked the Developer option or checkbox here to add it to your ribbon Trust Center...

VBA Macro Fundamentals

VBA Macro Fundamentals VBA 宏基础 Introduction to VBA VBA 简介 Visual Basic Application (VBA) Visual Basic 应用程序 (VBA) Visual Basic for Applications (VBA) is a programming language developed by Microsoft...

Resource Development & Weaponization

Resource Development & Weaponization 资源开发与武器化 Resource Development & Weaponization 资源开发与武器化 In the context of red teaming and penetration testing, resource development and weaponization are...

Phishing With Gophish

Phishing With Gophish 使用Gophish进行网络钓鱼 Gophish GoPhish is an open-source phishing framework designed for penetration testers and security professionals to simulate phishing attacks against their own...

Pretexting

Pretexting 假借借口 What is Pretexting? 什么是假借借口? ● Pretexting is the process of creating a false pretext or scenario to gain the trust of targets and extract sensitive information. This may involve imp...

Introduction To Social Engineering

Introduction To Social Engineering 社交工程简介 What is Social Engineering? 什么是社交工程? ● In the context of penetration testing and red teaming, social engineering is a technique used to manipulate individu...

Client Fingerprinting

Client Fingerprinting 客户端指纹识别 Client Fingerprinting 客户端指纹识别 ● Client fingerprinting is an active client information gathering technique used to gather information about a target system’s web browse...

Client-Side Information Gathering

Client-Side Information Gathering 客户端信息收集 Client-Side Information Gathering 客户端信息收集 ● When performing a client-side attack, the success of the attack will come down to the accuracy of the informati...

Client-Side Attack Vectors

Client-Side Attack Vectors 客户端攻击向量 What are Attack Vectors? 什么是攻击向量? ● In the context of penetration testing, an attack vector refers to a path or method used by an attacker to exploit vulnerabilit...