syselement's Blog
TwitterGitHubBuy Me a BookContact
  • â„šī¸Home
  • đŸ”ŗOperating Systems
    • 🐧Linux
      • 📃Everything Linux
      • Linux Distros
        • Kali Linux - VM
        • ParrotOS - VM
        • Rocky Linux
        • Ubuntu Desktop - VM
        • Ubuntu Server - VM
      • Linux Tools
        • BookStack
        • Nessus Essentials
        • SysReptor
        • Terminator
        • UniFi
        • Zsh & Oh-My-Zsh
    • đŸĒŸWindows
      • 📃Everything Windows
      • Windows Tools
        • Hashcat
        • Vagrant
      • Windows Virtual Machines
        • Windows 11 - VM
        • Windows Server 2025 - VM
  • 📝Courses Notes
    • eLearnSecurity / INE
      • eJPT - PTSv2
      • eMAPT
      • ICCA
    • Practical Networking
      • Practical TLS
        • TLS/SSL Overview
        • Cryptography
        • x509 Certificates and Keys
        • Security through Certificates
        • Cipher Suites
        • TLS/SSL Handshake
        • TLS Defenses
        • TLS Attacks & Vulnerabilities
        • What's new in TLS 1.3?
        • TLS 1.3 Under the Hood
        • TLS 1.3 Extensions
        • 🌐Practical TLS References
    • TCM Security
      • Linux101
      • MAPT
      • PEH
  • đŸ–Ĩī¸Cyber Everything
    • 📌Generic Resources
      • Cryptography
      • CVSS 3.1
      • Cyber Threat Intelligence (CTI)
    • 📱Mobile
      • Apps Lab
        • Android Rooting Guide
        • iOS Jailbreak Guide
        • Intercepting Android App Traffic
      • OWASP MAS
        • MASTG Techniques
        • MASTG Tests
        • MASTG Theory
        • MASVS Notes
      • Tools
        • MobSF
    • đŸ§ŦNetwork
    • 🌐Web
      • API
        • API Sec Fundamentals
        • API Penetration Testing
      • PortSwigger Academy
        • Server-Side Topics
        • Client-Side Topics
        • Advanced topics
        • đŸ”ŦVulnerability Labs
    • âœī¸Writeups & Walkthroughs
      • đŸŒŠī¸TryHackMe
        • 📖Learn
          • Cyber Threat Intelligence
          • Intro to Defensive Security
          • Juice Shop
          • Upload Vulnerabilities
        • đŸŽ¯Practice
          • Easy
            • Blaster
            • Blue
            • Bolt
            • Chill Hack
            • Ice
            • Ignite
            • Retro
            • Startup
          • Medium
            • Blog
      • đŸ“ĻHackTheBox
      • 🚩Capture The Flag
  • â™žī¸DevOps Everything
    • 🔗DevOps Resources
      • Introduction to DevOps
      • Ansible
      • Docker
      • Git
      • Kubernetes
      • Terraform
      • Vim
  • đŸ”ŦHome Lab
    • đŸ–Ĩī¸Hypervisors
      • Hyper-V
        • Windows WSL
      • Proxmox
        • Proxmox VE
        • Proxmox Upgrade 7 to 8
      • VMware
        • VMware Workstation Pro
    • 🔴Offensive Labs
      • Hashcat Password Cracking
      • Metasploitable3
    • đŸ”ĩDefensive Labs
      • Detection Lab
    • âšĒMisc Labs
      • Bitwarden On-Premise
      • OpenWrt & WiFi Exploitation
      • Passbolt CE - Ubuntu Server
Powered by GitBook
On this page
  • 🤝 Introduction
  • âœ‰ī¸ Contact
  • 🍕 Referrals

Was this helpful?

Edit on GitHub

Home

NextLinux

Last updated 28 days ago

Was this helpful?

🤝 Introduction

Hi, syselement here 🧑‍đŸ’ģ, sharing some interesting Information Technology and Cybersecurity notes and stuff.

Welcome to my notes blog! This blog is intended to provide information and insights on various topics related to Cybersecurity, Ethical Hacking and Systems Administration, based on public open-source material and software, and should not be considered as a substitute for professional advice or guidance.

👈 Check the menu on the left for more!

❗ Disclaimer

The content on this notes blog is intended solely for educational, personal, non-commercial, testing, and research purposes. It must not be used for illegal or malicious activities. The information provided is based on publicly available material, as well as on my own interpretations and commentary, which may not always be up-to-date. Use this content at your own risk. By accessing these notes, you agree to absolve me of any liability. All references and comments from external resources will include a link to the original source.

âœī¸ Copyright ÂŠī¸ 2025 syselement

While much of the material in this blog is derived from public sources and is not subject to copyright, my original commentary, analysis, and writing are protected. You are free to share and redistribute this content as long as proper attribution is provided, including a reference to me (syselement) and a link to the utilized resource. Redistribution and adaptations must respect the principles of responsible sharing and this license. Sharing responsibly helps maintain the integrity and value of the work while encouraging collaboration and learning.


âœ‰ī¸ Contact





🍕 Referrals







🔗 (Get 5$ on a Premium Subscription)

🔗

🔗 (Get 10 points with a Pro Subscription)

🔗

🔗 (Italian CyberSecurity Community)

🔗

â„šī¸
TryHackMe
HackTheBox
PentesterLab
PWNX
SecurityCert
KodeKloud
đŸ