Group
  • Home
  • Posts
  • Support
  • LinkedIn
  • Q&A

InfoSec

Infosec/Cyber related
Go Count Hashes

Go Count Hashes

Get more from your ntds.dit data, generally we acquire this file to maul an environment, but there's a blue way to provide value without cracking a single hash, it's to count them.

Read more
Vertical Vulnerability Managment

Vertical Vulnerability Managment

Vulnerabilities are technology, security and risk vertical, as should be the management.

Read more
Imposter.

Imposter.

Thoughts on Imposter Syndrome, In summation; Imposter Syndrome is the consequence of poor support.

Read more
Group

Emergency Cyber Security Support

The Contractor 🏴‍☠️🧯 © 2023

Connect

Twitter
@thecontractorio
Bluesky
@thecontractorio
Threads
@yosignals
LinkedIn
JC

Pages

  • Support
  • Posts
  • Q&A

Topics

  • OSINT
  • Defence
  • Appsec
  • Entsec
  • Infosec
  • Offsec
  • Exploitation
  • Privacy
  • Random
  • Ideas
  • Archive