Tricks of the Trade from 5+ years in Offensive Cyber Security

Great tricks i like the first one

1 Like

Very interesting tips :grinning:

1 Like

great job @vorticalbox

1 Like

thANK U SO MUCHHH 11111

great one thank you so much for this.

this was such a great post.

1 Like

Thanks for this info. The only issue I have ever found with Docker at least is when you need to alternate between wireless networks, it isn’t exactly the easiest. Mainly why I stick with VBox at the moment.

But maybe something I should just look into and learn more about.

1 Like

Was worth reading for just this alone:
alias nmap=“grc nmap”
Post fires off a lot of interesting ideas.

Torify never works for me but I also have never tried too hard to fix that. torsocks and proxychains work well enough.

I feel like I can learn alot from you , Look forward to getting to know you all and diving deeper

Thanks for the sharing, that’s a great post !

I thought this was great, thank you.

Why use tools like Ohmyzsh? I mean, you can edit and customize everything you need when you switch to the right directory and then nano bash.bashrc. For example, the picture below is my terminal and I didn’t use any tools whatsoever. I just piped the PS1 through lolcat and did the same with the figlet command

this post was pretty good. thanks for the info it was very easy to follow.

Props, good info. Thanks for sharing.