Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: red-team

Mastering Server-Side Request Forgery (SSRF) Exploitation in 2025
red-team

Mastering Server-Side Request Forgery (SSRF) Exploitation in 2025

Server-Side Request Forgery (SSRF) is one of the most critical web vulnerabilities professionals in cybersecurity must understand. This powerful exploit

by ☣️ Mr. The Plague ☣️
Read More
Critical SAP Vulnerability CVE-2025-31324: What You Need to Know
Exploits

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know

In the fast-evolving world of cybersecurity, a new threat has emerged that demands immediate attention from organizations relying on SAP

by ☣️ Mr. The Plague ☣️
Read More
Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week
News

Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week

In the ever-evolving world of cybersecurity, staying informed about the latest threats and incidents is crucial for professionals tasked with

by ☣️ Mr. The Plague ☣️
Read More
Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492
Exploits

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492

In the ever-evolving landscape of cybersecurity, a new critical vulnerability has emerged that demands the attention of network administrators, penetration

by ☣️ Mr. The Plague ☣️
Read More
AWS CLI Cheat Sheet for Professionals
red-team

AWS CLI Cheat Sheet for Professionals

Top 100 AWS CLI Commands Below is a categorized list of 100 commonly used AWS CLI commands across various services,

by ☣️ Mr. The Plague ☣️
Read More
Top 100 Linux Commands Cheat Sheet for Power Users
Tools

Top 100 Linux Commands Cheat Sheet for Power Users

Welcome to the ultimate Linux commands cheat sheet, designed for beginners and seasoned sysadmins alike. This comprehensive guide covers 100

by ☣️ Mr. The Plague ☣️
Read More
Critical Vulnerability in Langflow: CVE-2025-3248 Explained
red-team

Critical Vulnerability in Langflow: CVE-2025-3248 Explained

Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a

by ☣️ Mr. The Plague ☣️
Read More
Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet
Tools

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet

Table of Contents Why John the Ripper Dominates in 2025 Developed by Openwall, John the Ripper (JtR) excels at cracking

by ☣️ Mr. The Plague ☣️
Read More
CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?
News

CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?

Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –

by ☣️ Mr. The Plague ☣️
Read More
Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet
Cyber Security

Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet

Metasploit is the ultimate penetration testing tool dominating cybersecurity in 2025. With a massive library of real-world exploits and seamless

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

1 2 Next
© Hack the Planet
Privacy Policy & Terms of Service