Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

Obviously with BASIC authentication the user is going to be asked for their credentials.

We are then able to gain a graphical view of the Domain’s user community:

As you would expect, office printers are often identified when conducting a penetration test of an office network.

Access Required There is some access required, as this is privilege escalation.

It’s been a bit since I spent some time looking for a web vuln… And this...

As you may have read in my about page, I am OSCP and OSCE.

A tool to find Windows registry files in a blob of data

First, the victim has to set the information which he doesn't want to disclose with privacy settings as "Only Me".

I wanted to take a moment to explain how to create a simple "Hello World" PyCommand script that I learned about while working through the modules in …

View previous queries