Cybersecurity StashCybersecurity Monitoring: Safeguarding Your Digital FortressIn today’s interconnected digital landscape, the importance of cybersecurity monitoring cannot be overstated. As organizations increasingly…Aug 3, 2023Aug 3, 2023
Cybersecurity StashCybersecurity as a Service: Enhancing Digital Defense in the Modern EraIn today’s interconnected world, where businesses rely heavily on technology and data, the need for robust cybersecurity measures has never…Aug 3, 2023Aug 3, 2023
Cybersecurity StashBuilding a OSINT Buscador Machine on Windows (Part1)This is a quick guide to step through how to build a OSINT Buscador machine from scratch, installing custom OSINT tools on it. We will be…Jul 24, 20191Jul 24, 20191
Cybersecurity StashPart 1: Modern Honey Network (MHN) — Installing Server on EC2 InstanceToday, I’m going to show you the steps on how to deploy Modern Honey Network (MHN). The Modern Honey Network project makes deploying and…Oct 20, 20164Oct 20, 20164
Cybersecurity StashRunning Ubuntu Desktop GUI (AWS EC2 Instance) on WindowsIn order to run Ubuntu GUI (hosted on AWS EC2) on your Windows host, follow these instructions to install Ubuntu desktop & TightVNC server…Apr 27, 201615Apr 27, 201615
Cybersecurity StashRunning Metasploit on Kali Linux Docker (AWS EC2 Instance)Installing DockerApr 22, 20161Apr 22, 20161