Forem

# pentesting

Offensive security techniques and methodologies for penetration testing.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
HaleHound CYD Review: Is a $15 Pwnagotchi Alternative Actually Worth It for WiFi Pentesting? [2026]

HaleHound CYD Review: Is a $15 Pwnagotchi Alternative Actually Worth It for WiFi Pentesting? [2026]

1
Comments
7 min read
Windows PrivEsc 01: Initial Enumeration (The Part That Actually Matters)
Cover image for Windows PrivEsc 01: Initial Enumeration (The Part That Actually Matters)

Windows PrivEsc 01: Initial Enumeration (The Part That Actually Matters)

Comments
2 min read
Recruiters filtered out the operators who can actually breach

Recruiters filtered out the operators who can actually breach

1
Comments
7 min read
Pentesting Methodology: The 5 Phases That Structure Every Engagement

Pentesting Methodology: The 5 Phases That Structure Every Engagement

Comments
1 min read
AD pentesting part 2: C2, pivoting & password spraying
Cover image for AD pentesting part 2: C2, pivoting & password spraying

AD pentesting part 2: C2, pivoting & password spraying

Comments
1 min read
FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation
Cover image for FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation

FTP Plaintext Exposure: 3M Unencrypted Servers & Active Exploitation

1
Comments 1
5 min read
Basic-Fit Breach: Targeting SaaS Membership Platforms at Scale
Cover image for Basic-Fit Breach: Targeting SaaS Membership Platforms at Scale

Basic-Fit Breach: Targeting SaaS Membership Platforms at Scale

Comments
7 min read
PlugX RAT via Fake Claude: DLL Sideloading Supply Chain Attack
Cover image for PlugX RAT via Fake Claude: DLL Sideloading Supply Chain Attack

PlugX RAT via Fake Claude: DLL Sideloading Supply Chain Attack

Comments
7 min read
Grafana, Passwords, and Poor Life Choices: CVE-2021-43798

Grafana, Passwords, and Poor Life Choices: CVE-2021-43798

Comments
7 min read
How to Run AI-Assisted Pentesting Locally Without Leaking Client Data
Cover image for How to Run AI-Assisted Pentesting Locally Without Leaking Client Data

How to Run AI-Assisted Pentesting Locally Without Leaking Client Data

Comments 1
5 min read
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs
Cover image for ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

Comments
6 min read
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis
Cover image for CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

Comments
5 min read
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation
Cover image for Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Comments
2 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion
Cover image for Shields Up Defense Tech: Red Team Attack Surface Expansion

Shields Up Defense Tech: Red Team Attack Surface Expansion

Comments
5 min read
Reveal Hidden Files in Google Storage - Pwnedlabs (Google Cloud pentesting)

Reveal Hidden Files in Google Storage - Pwnedlabs (Google Cloud pentesting)

1
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.