Advertisement · 728 × 90
#
Hashtag
#iusevimbtw
Advertisement · 728 × 90
Preview
Extract Secrets from Multiple Configuration Files Using Vim Learn how to extract secrets from compromised Linux servers using Vim's built-in capabilities. This guide shows penetration testers how to search config files, extract credentials, and exfiltrate data...

To no one's surprise who knows me, I've written an article, in particular, about #Vim and how you can leverage it during a pentest.

If you have time (and patience), give it a read. Let me know what you think and please share it with others. #iusevimbtw

0 0 0 0

I just got a #iusevimbtw Email address. :D

0 0 0 0
Post image

My fiancé got me a vim T-shirt. #iusevimbtw

1 0 1 0