NETSEC

Latest

NETSEC

Learning, Sharing, Creating

Cybersecurity Memo

Saturday, February 15, 2025

Using AI to Generate Commands and Run it From Linux Command Shell

Friday, February 14, 2025

CEHv13 Notes - Module 02: Footprinting and Reconnaissance

Thursday, February 13, 2025

Understanding TCPDUMP Grammar and Output with Examples
MDE Deployment and Configuration Steps with Security Policy Details
Underdefense MAXI Platform

Tuesday, February 11, 2025

Kali Tools Usage (proxychain, tor, discover, nmap, msf, sgpt, etc)

Monday, February 10, 2025

CISO Leadership Workshop Overview (Job, Priority, Tabletop, Mindmap)

Thursday, February 6, 2025

Tailscale VPN Configuration Including Exit Node in 5 Minutes
Microsoft Defender for Endpoint Resources and Fast Steps to Configure