Blog
cURL for Pentesters: Part 3 – Advanced Techniques
In Part 1 and Part 2, we covered the fundamentals and intermediate techniques. Now we'll explore curl's automation capabilities through globbing, handling various authentication schemes, and learn techniques for bypassing common restrictions. These skills separate...
cURL for Pentesters: Part 2 – Cookies, Sessions, & SSL/TLS
In Part 1 of our series of curl usage, we covered the fundamentals: headers, request methods, and basic data submission. Now we'll look at some techniques that'll make you look like a curl pro. We'll be covering cookies, SSL certificate handling, and extracting only...
cURL for Pentesters: Part 1 – Master the Fundamentals
If you're new to penetration testing, curl might seem like just another command line tool in an already overwhelming toolkit. But here's the thing: curl is likely the most universally available HTTP client you'll encounter. Whether you've just compromised a Linux...
How to Use NVIDIA Graphics Cards in WSL 2
Stop leaving GPU performance on the table! Follow this guide to enable NVIDIA support in WSL 2 and supercharge your pentesting workloads.
How to Network for a CyberSecurity Job
The Do’s and Don’ts to succeed in networking. While these tips work for everyone, they especially help introverts succeed in an extrovert’s game.