Tony MersanDetecting Malicious Activity on a Server: Case StudyA few months ago, I noticed an unusual behavior on one of my servers.Oct 9Oct 9
Tony MersanBurp Suite for GeeksWhat is the main thing used for pentesting web applications?Aug 14Aug 14
Tony MersanVulnerabilities in Computer GamesToday I want to raise such a topic as vulnerabilities in computer games.Aug 14Aug 14
Tony MersanSolidifying your privacy [Anonym for hardening]Setup a safe Gateway to tor above kali (for hacking)Jul 16Jul 16
Tony MersanThe PingRAT technique [escape AV/EDR] 🚩Secretly pass C2 traffic through firewalls using ICMP payloads 👇May 14May 14
Tony MersanMy Mental Hacker MAP [MINDSET]For all of you, recent and soldiers is a bit my methodology that I follow ;)Apr 24Apr 24