![](media/tutorials/images/installing-gui-linux/icon_image/Installing_A_GUI_On_Linux_icon.png)
Installing A GUI On Linux by evilsaint
27 Apr 2022, 12:09 p.m.![](media/articles/images/curl-pentesters/icon_image/Curl_For_Pentesters_icon.png)
Curl For Pentesters by evilsaint
19 Apr 2022, 12:44 p.m.Curl can be used for a number of useful activities during a pentest engagement. It can send HTTP Methods and data to an API endpoint, upload a file to a WebDav Server or grab server response headers, ...
read more![](media/tutorials/images/setting-webdav-server/icon_image/Setting_Up_A_WebDav_Server_icon.png)
Setting Up A WebDav Server by evilsaint
12 Apr 2022, 2:38 p.m.![](media/tutorials/images/dumping-rdp-credentials-logged-user/icon_image/Dumping_RDP_Credentials_For_Logged_In_User_icon.png)
Dumping RDP Credentials For Logged In User by evilsaint
28 Feb 2022, 12:38 a.m.![](media/articles/images/wsl2-error-system-has-not-been-booted-systemd-init-system-pid-1-cant-operate/icon_image/WSL2_Error_System_has_not_been_booted_with_systemd_as_init_system_icon.png)
This article demonstrates how to fix the error "System has not been booted with systemd as init system (PID 1). Can't operate. Failed to connect to bus: Host is down" when using WSL version 2....
read more![](media/articles/images/creating-smb-servers/icon_image/Creating_SMB_Servers_icon.png)
Creating SMB Servers by evilsaint
22 Apr 2022, 6:20 p.m.![](media/articles/images/encoding-powershell/icon_image/Encoding_PowerShell_icon.png)
Encoding PowerShell by evilsaint
19 Apr 2022, 12:14 p.m.The use of the `-EncodedCommand` PowerShell parameter is typically used by Administrators to run complex scripts without having to worry about escaping characters. However, it is commonly used by adve...
read more![](media/articles/images/linux-privilege-escalation-commands/icon_image/Linux_Privilege_Escalation_Commands_icon.png)
Linux Privilege Escalation Commands by evilsaint
11 Apr 2022, 10:59 a.m.To exploit systems, attackers utilise a technique known as "enumeration" to find flaws that could lead to privilege escalation. Privilege Escalation is where a user can get elevated access to resource...
read more![](media/articles/images/wsl2-installing-metasploit-kali/icon_image/WSL2_Installing_Metasploit_Framework_with_Kali_Linux_icon.png)
WSL2 - Installing Metasploit Framework with Kali Linux by at0mik
25 Feb 2022, 4:04 p.m.This article demonstrates how to install the Metasploit Framework with Kali Linux on WSL2....
read more![](media/articles/images/security-log-reference/icon_image/Security_Log_Reference_icon.png)