Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: pentesting

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet
Tools

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet

Table of Contents Why John the Ripper Dominates in 2025 Developed by Openwall, John the Ripper (JtR) excels at cracking

by ☣️ Mr. The Plague ☣️
Read More
CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?
Educational

CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?

Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –

by ☣️ Mr. The Plague ☣️
Read More
Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet
Exploits

Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet

Metasploit is the ultimate penetration testing tool dominating cybersecurity in 2025. With a massive library of real-world exploits and seamless

by ☣️ Mr. The Plague ☣️
Read More
Master Nikto in 2025: 50 Essential Commands Every Hacker Needs – With Bonus Web Security Cheat Sheet
pentesting

Master Nikto in 2025: 50 Essential Commands Every Hacker Needs – With Bonus Web Security Cheat Sheet

Nikto is the ultimate web server scanner dominating the cybersecurity scene in 2025. Armed with over 6,700 checks for vulnerabilities,

by ☣️ Mr. The Plague ☣️
Read More
Ivanti Zero-Day Malware: What You Need to Know
red-team

Ivanti Zero-Day Malware: What You Need to Know

Key Points Overview A newly discovered zero-day vulnerability, known as CVE-2025-0282, has been found in Ivanti products like Connect Secure,

by ☣️ Mr. The Plague ☣️
Read More
The Check Point Breach: A Detailed Analysis
Cyber Security

The Check Point Breach: A Detailed Analysis

Key Points The Check Point Breach: A Detailed Analysis Overview On March 30, 2025, at 09:20 AM PDT, the cybersecurity

by ☣️ Mr. The Plague ☣️
Read More
Top 100 Nmap Commands Every Hacker Needs in 2025 – With Bonus Tool Cheat Sheets
pentesting

Top 100 Nmap Commands Every Hacker Needs in 2025 – With Bonus Tool Cheat Sheets

Nmap is the ultimate tool for hackers and penetration testers in 2025, offering unmatched versatility for network reconnaissance, vulnerability scanning,

by ☣️ Mr. The Plague ☣️
Read More
The Art of Thinking Like a Hacker: A Comprehensive Guide to Threat Modeling
AI Co-Author

The Art of Thinking Like a Hacker: A Comprehensive Guide to Threat Modeling

In a digital landscape where cyber threats evolve faster than you can say “password123,” playing defense isn’t enough. You need

by ☣️ Mr. The Plague ☣️
Read More
Next.js Auth Bypass – CVE-2025-29927
red-team

Next.js Auth Bypass – CVE-2025-29927

Key Points Vulnerability Overview CVE-2025-29927 is an authentication bypass issue in Next.js, a popular React framework for building web applications.

by ☣️ Mr. The Plague ☣️
Read More
Cyber Security Morning Brief – Week of March 14–21, 2025
red-team

Cyber Security Morning Brief – Week of March 14–21, 2025

Good morning, pentesters, red team, and blue team members! Welcome to your weekly cyber security briefing from SquidHacker.com, covering the

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 2
© Hack the Planet
Privacy Policy & Terms of Service