Creating Your Own VPN
Creation and configuration of a VPN using your own server.
I am an offensive security specialist, focused on pentesting and Red Team operations (adversary emulation and simulation).
Creation and configuration of a VPN using your own server.
Tool that redirects program traffic through one or more proxies.
Setting up a privacy-focused Windows environment using Whonix.
Setting up a static website on the Tor network.
Study reference for the CBP certification from The SecOps Group.
Study reference for the CCSP-AWS certification from The SecOps Group.
Study reference for the CNSP certification from The SecOps Group.
Study reference for the CAP certification from The SecOps Group.
Google Dork generator for reconnaissance and OSINT research.
Interactive CVSS v3.1 calculator.
Analyze password strength, entropy and crack time with educational feedback.
Decode and analyze JWT tokens securely.
Extract and analyze EXIF metadata from images.