Skip to content

Toolbox

Exploit Databases & CVEs Recon
Vulnerability & exploit lookup resources

Key resources for vulnerability research — CVE databases, exploit archives, and advisory feeds for identifying and understanding known vulnerabilities.

Read more →
Censys Recon
Certificate & host search engine

Internet-wide scanning platform — search certificates, hosts, and services. Strong for TLS/certificate reconnaissance and subdomain discovery.

Read more →
VirusTotal Recon
Multi-engine malware & threat intel scanner

Multi-engine malware scanner and threat intelligence aggregator — scan files, URLs, IPs, and domains against 70+ antivirus engines and datasets.

Read more →
Google Dorking Recon
Advanced search operators for OSINT

Advanced search operators for Google and other engines — finding exposed files, login pages, directories, and sensitive information indexed by search engines.

Read more →
Shodan Recon
Search engine for internet-connected devices

Search engine for internet-connected devices — find servers, webcams, industrial systems, databases, and services by banners, ports, and metadata.

Read more →
Nmap Recon
Port scanning & service detection

Network exploration and security auditing tool — port scanning, service detection, OS fingerprinting, scripting engine.

Read more →
grep CLI
Pattern search in files and output

Search text using patterns — filter files, command output, and logs by string or regex match. One of the most-used commands in Linux.

Read more →
Linux Filesystem Fundamentals
Key directories and what lives where

Key directories in the Linux filesystem hierarchy — what lives where, what to look at during recon, and what matters for administration.

Read more →
Crontab CLI
Scheduled task automation with cron

Schedule recurring tasks with cron — syntax, common patterns, per-user and system crontabs, and debugging tips.

Read more →
File Permissions Fundamentals
chmod, chown, and rwx explained

Linux file permissions — understanding rwx, octal notation, chmod, chown, chgrp, SUID/SGID/sticky bit, and common permission patterns.

Read more →
Linux Logs Sysadmin
Key log files and where to find them

Important log files and locations — what to check for troubleshooting, security auditing, and incident response on Linux systems.

Read more →
Shell Operators CLI
Command chaining, redirection & control flow

Bash operators for chaining commands, redirecting output, running background processes, and controlling execution flow.

Read more →
Shells Fundamentals
Shell types, detection, and upgrades

Linux and Windows shells — identifying what shell you're in, differences between common shells, and upgrading limited shells to fully interactive ones.

Read more →
SSH Hardening Hardening
Secure your OpenSSH server config

Practical checklist for securing OpenSSH server configuration on Linux.

Read more →
FFmpeg Media
Audio/video conversion & transcoding

Swiss army knife for audio/video conversion, transcoding, recording, and streaming.

Read more →