koreyhacks_

Ethical Hacking Journey

Documenting my path into ethical hacking and cybersecurity

Welcome to my digital journal where I share my experiences, tools, discoveries, and challenges as an ethical hacker. Learn penetration testing techniques, vulnerability assessment methods, and security best practices.

Featured Post

Domain Enumeration: Techniques and Tools

A comprehensive guide to domain enumeration techniques and tools used in the reconnaissance phase of penetration testing.

Active DirectoryReconnaissancePenetration TestingWindows
Domain Enumeration: Techniques and Tools
Matrix code background
1
1
0
0
1
1
0
0
1
0
1
1
1
0
1
0
0
0
0
0
_
Access Granted

Exclusive Content Awaits

Take the red pill and discover advanced ethical hacking techniques, exclusive tutorials, and member-only resources.

Advanced penetration testing walkthroughs

Exclusive security tools and scripts

Try PassFortress

PassFortress

Test your password strength with our advanced security analyzer.

Latest Journal Entries

Tech Stack

Operating Systems

  • Kali Linux
  • Windows
  • Ubuntu
  • macOS

Defensive Security Tools

  • Microsoft Azure
  • Tenable/Nessus
  • Proofpoint
  • SolarWinds

Offensive Security

  • Metasploit
  • Responder
  • BloodHound
  • Nmap

Stay Updated

Subscribe to my newsletter for the latest tutorials, tools, and tips on ethical hacking.

Important Disclaimer

The techniques and tools demonstrated on this site should only be used in controlled environments with proper authorization. Unauthorized use of these techniques against systems you don't own or have explicit permission to test is illegal and unethical.