Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Category: red-team

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492
blue-team

Critical ASUS Router Vulnerability: Understanding and Mitigating CVE-2025-2492

In the ever-evolving landscape of cybersecurity, a new critical vulnerability has emerged that demands the attention of network administrators, penetration

by ☣️ Mr. The Plague ☣️
Read More
AWS CLI Cheat Sheet for Professionals
Educational

AWS CLI Cheat Sheet for Professionals

Top 100 AWS CLI Commands Below is a categorized list of 100 commonly used AWS CLI commands across various services,

by ☣️ Mr. The Plague ☣️
Read More
Top 100 Linux Commands Cheat Sheet for Power Users
pentesting

Top 100 Linux Commands Cheat Sheet for Power Users

Welcome to the ultimate Linux commands cheat sheet, designed for beginners and seasoned sysadmins alike. This comprehensive guide covers 100

by ☣️ Mr. The Plague ☣️
Read More
Critical Vulnerability in Langflow: CVE-2025-3248 Explained
News

Critical Vulnerability in Langflow: CVE-2025-3248 Explained

Introduction In the fast-evolving world of artificial intelligence, tools like Langflow are helping developers create powerful AI-driven applications. However, a

by ☣️ Mr. The Plague ☣️
Read More
Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet
pentesting

Master John the Ripper in 2025: Top 100 Commands Every Hacker Needs – With Bonus Password Cracking Cheat Sheet

Table of Contents Why John the Ripper Dominates in 2025 Developed by Openwall, John the Ripper (JtR) excels at cracking

by ☣️ Mr. The Plague ☣️
Read More
CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?
Educational

CrushFTP Flaw Exposed: Hackers Are Taking Over Systems Right Now – Are You Next?

Key Points NOTE: Much of this article’s information including the POC and detection template was sourced from ProjectDiscovery Blog –

by ☣️ Mr. The Plague ☣️
Read More
Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet
red-team

Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet

Metasploit is the ultimate penetration testing tool dominating cybersecurity in 2025. With a massive library of real-world exploits and seamless

by ☣️ Mr. The Plague ☣️
Read More
Ivanti Zero-Day Malware: What You Need to Know
red-team

Ivanti Zero-Day Malware: What You Need to Know

Key Points Overview A newly discovered zero-day vulnerability, known as CVE-2025-0282, has been found in Ivanti products like Connect Secure,

by ☣️ Mr. The Plague ☣️
Read More
The Check Point Breach: A Detailed Analysis
blue-team

The Check Point Breach: A Detailed Analysis

Key Points The Check Point Breach: A Detailed Analysis Overview On March 30, 2025, at 09:20 AM PDT, the cybersecurity

by ☣️ Mr. The Plague ☣️
Read More
Top 100 Nmap Commands Every Hacker Needs in 2025 – With Bonus Tool Cheat Sheets
Cyber Security

Top 100 Nmap Commands Every Hacker Needs in 2025 – With Bonus Tool Cheat Sheets

Nmap is the ultimate tool for hackers and penetration testers in 2025, offering unmatched versatility for network reconnaissance, vulnerability scanning,

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 2 3 Next
© SQUID SEC 2025 - Website developed by WP Theme Space | Create Your Professional Website