
Powershell for pentesters
This lab focuses on leveraging PowerShell to gain initial access to a machine. You will then establish remote access and exploit a second machine that is not directly accessible from Kali. By ident...

This lab focuses on leveraging PowerShell to gain initial access to a machine. You will then establish remote access and exploit a second machine that is not directly accessible from Kali. By ident...

Sharpen your cryptography skills by analyzing code to get the flag.

Want to hear some lo-fi beats, to relax or study to? We've got you covered!

Try to exploit our image gallery system

Can you exploit the sticker shop in order to capture the flag?

This is a sample script That you can get the geolocation with the ip address.

This a ctf challenge from tryhackme, im gonna explain here step by step