Cybersecurity StashCybersecurity Monitoring: Safeguarding Your Digital FortressIn today’s interconnected digital landscape, the importance of cybersecurity monitoring cannot be overstated. As organizations increasingly…14 min read·Aug 3, 2023----
Cybersecurity StashCybersecurity as a Service: Enhancing Digital Defense in the Modern EraIn today’s interconnected world, where businesses rely heavily on technology and data, the need for robust cybersecurity measures has never…18 min read·Aug 3, 2023----
Cybersecurity StashBuilding a OSINT Buscador Machine on Windows (Part1)This is a quick guide to step through how to build a OSINT Buscador machine from scratch, installing custom OSINT tools on it. We will be…3 min read·Jul 24, 2019--1--1
Cybersecurity StashPart 1: Modern Honey Network (MHN) — Installing Server on EC2 InstanceToday, I’m going to show you the steps on how to deploy Modern Honey Network (MHN). The Modern Honey Network project makes deploying and…3 min read·Oct 20, 2016--4--4
Cybersecurity StashRunning Ubuntu Desktop GUI (AWS EC2 Instance) on WindowsIn order to run Ubuntu GUI (hosted on AWS EC2) on your Windows host, follow these instructions to install Ubuntu desktop & TightVNC server…2 min read·Apr 27, 2016--15--15
Cybersecurity StashRunning Metasploit on Kali Linux Docker (AWS EC2 Instance)Installing Docker4 min read·Apr 22, 2016--1--1