Skip to content
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team
  • Home
  • Cheat Sheets
  • Squid Sec Twitter
  • SquidSec Podcast
  • SquidSec Team

Tag: pentesting

Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet
Educational

Master Metasploit in 2025: Top 100 Commands Every Hacker Needs – With Bonus Penetration Testing Cheat Sheet

Metasploit is the ultimate penetration testing tool dominating cybersecurity in 2025. With a massive library of real-world exploits and seamless

by ☣️ Mr. The Plague ☣️
Read More
Master Nikto in 2025: 50 Essential Commands Every Hacker Needs – With Bonus Web Security Cheat Sheet
Educational

Master Nikto in 2025: 50 Essential Commands Every Hacker Needs – With Bonus Web Security Cheat Sheet

Nikto is the ultimate web server scanner dominating the cybersecurity scene in 2025. Armed with over 6,700 checks for vulnerabilities,

by ☣️ Mr. The Plague ☣️
Read More
Ivanti Zero-Day Malware: What You Need to Know
pentesting

Ivanti Zero-Day Malware: What You Need to Know

Key Points Overview A newly discovered zero-day vulnerability, known as CVE-2025-0282, has been found in Ivanti products like Connect Secure,

by ☣️ Mr. The Plague ☣️
Read More
The Check Point Breach: A Detailed Analysis
blue-team

The Check Point Breach: A Detailed Analysis

Key Points The Check Point Breach: A Detailed Analysis Overview On March 30, 2025, at 09:20 AM PDT, the cybersecurity

by ☣️ Mr. The Plague ☣️
Read More
Top 100 Nmap Commands Every Hacker Needs in 2025 – With Bonus Tool Cheat Sheets
Tools

Top 100 Nmap Commands Every Hacker Needs in 2025 – With Bonus Tool Cheat Sheets

Nmap is the ultimate tool for hackers and penetration testers in 2025, offering unmatched versatility for network reconnaissance, vulnerability scanning,

by ☣️ Mr. The Plague ☣️
Read More
Geopolitical and IoT Threats: A Growing Concern in 2025
AI Co-Author

Geopolitical and IoT Threats: A Growing Concern in 2025

In today’s hyper-connected world, the boundaries between geopolitics and cybersecurity are fading fast. State-sponsored cyber threats are no longer limited

by ☣️ Mr. The Plague ☣️
Read More
The Art of Thinking Like a Hacker: A Comprehensive Guide to Threat Modeling
pentesting

The Art of Thinking Like a Hacker: A Comprehensive Guide to Threat Modeling

In a digital landscape where cyber threats evolve faster than you can say “password123,” playing defense isn’t enough. You need

by ☣️ Mr. The Plague ☣️
Read More
The Rise of Ransomware: How It Works and How to Fight Back
Cyber Security

The Rise of Ransomware: How It Works and How to Fight Back

Ransomware has morphed from a rare cyber nuisance into a global crisis, with attacks surging by 13% in 2022 alone,

by ☣️ Mr. The Plague ☣️
Read More
npm Nightmares: Ethers Library Hijacked for Reverse Shell Chaos
blue-team

npm Nightmares: Ethers Library Hijacked for Reverse Shell Chaos

Direct Answer Overview On March 15, 2025, security researchers identified two malicious npm packages targeting the ethers library, a popular

by ☣️ Mr. The Plague ☣️
Read More
Next.js Auth Bypass – CVE-2025-29927
Educational

Next.js Auth Bypass – CVE-2025-29927

Key Points Vulnerability Overview CVE-2025-29927 is an authentication bypass issue in Next.js, a popular React framework for building web applications.

by ☣️ Mr. The Plague ☣️
Read More

Posts pagination

Previous 1 2 3 4 Next
© Hack the Planet
Privacy Policy & Terms of Service