Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: red-team

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know
Cyber Security

Critical SAP Vulnerability CVE-2025-31324: What You Need to Know

In the fast-evolving world of cybersecurity, a new threat has emerged that demands immediate attention from organizations relying on SAP

by ☣️ Mr. The Plague ☣️
Read More
Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week
pentesting

Cyber Gossip: Top Cybersecurity Discussions in the Hacking Community this Week

In the ever-evolving world of cybersecurity, staying informed about the latest threats and incidents is crucial for professionals tasked with

by ☣️ Mr. The Plague ☣️
Read More
Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492
Cyber Security

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492

In the ever-evolving landscape of cybersecurity, a new critical vulnerability has emerged that demands the attention of network administrators, penetration

by ☣️ Mr. The Plague ☣️
Read More
AWS CLI Cheat Sheet for Professionals
cheat-sheet

AWS CLI Cheat Sheet for Professionals

Top 100 AWS CLI Commands Below is a categorized list of 100 commonly used AWS CLI commands across various services,

by ☣️ Mr. The Plague ☣️
Read More
Top 100 Linux Commands Cheat Sheet for Power Users
pentesting

Top 100 Linux Commands Cheat Sheet for Power Users

Welcome to the ultimate Linux commands cheat sheet, designed for beginners and seasoned sysadmins alike. This comprehensive guide covers 100

by ☣️ Mr. The Plague ☣️
Read More
Critical Vulnerability in Langflow: CVE-2025-3248 Explained
News

Critical Vulnerability in Langflow: CVE-2025-3248 Explained

Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a

by ☣️ Mr. The Plague ☣️
Read More
Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet
red-team

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet

Table of Contents Why John the Ripper Dominates in 2025 Developed by Openwall, John the Ripper (JtR) excels at cracking

by ☣️ Mr. The Plague ☣️
Read More
CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?
red-team

CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?

Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –

by ☣️ Mr. The Plague ☣️
Read More
Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet
Cyber Security

Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet

Metasploit is the ultimate penetration testing tool dominating cybersecurity in 2025. With a massive library of real-world exploits and seamless

by ☣️ Mr. The Plague ☣️
Read More
Ivanti Zero-Day Malware: What You Need to Know
red-team

Ivanti Zero-Day Malware: What You Need to Know

Key Points Overview A newly discovered zero-day vulnerability, known as CVE-2025-0282, has been found in Ivanti products like Connect Secure,

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 2 3 Next
© SQUID SEC 2026 - Website developed by WP Theme Space | Create Your Professional Website