Latest activity
Attacking Common Applications
4/11/2024
Penetration Testers can come across various applications, such as Content Management Systems, custom web applications, internal portals used by developers and sysadmins, and more. It's common to find the same applications across many different environments. While an application may not be vulnerable in one environment, it may be misconfigured or unpatched in the next. It is important as an assessor to have a firm grasp of enumerating and attacking the common applications discussed in this module. This knowledge will help when encountering other types of applications during assessments.
Introduction to Malware Analysis
10/10/2024
This module offers an exploration of malware analysis, specifically targeting Windows-based threats. The module covers Static Analysis utilizing Linux and Windows tools, Malware Unpacking, Dynamic Analysis (including malware traffic analysis), Reverse Engineering for Code Analysis, and Debugging using x64dbg. Real-world malware examples such as WannaCry, DoomJuice, Brbbot, Dharma, and Meterpreter are analyzed to provide practical experience.
Active projects (5)
See all projects See all projects linkCodelab - Coding platform
JS • Next.js • Tailwind • Eslint
Business management system
JS • Next.js • Tailwind • Eslint • Docker • Supabase • Cypress
Chess - frontend / backend
TS • Next.js • Tailwind • Eslint • Docker • MongoDB • Redis • Socket.io • Mocha
Networking app for architects
JS • Next.js • Tailwind • Eslint • MongoDB • Stripe • Mailchimp
Assembly code editor
JS • Next.js • Tailwind • Eslint
Get in touch
Email me at hi@hectortoral.com hi@hectortoral.com link or follow me via my social links.