syselement's Blog
🏠 Home BlogXGitHub📚 Buy Me a Book📧 Contact
  • 🏠Home
  • 🔳Operating Systems
    • 🐧Linux
      • 📃Everything Linux
      • Linux Distros
        • Kali Linux - VM
        • ParrotOS - VM
        • Rocky Linux
        • Ubuntu Desktop - VM
        • Ubuntu Server - VM
      • Linux Tools
        • BookStack
        • Nessus Essentials
        • SysReptor
        • Terminator
        • UniFi
        • Zsh & Oh-My-Zsh
    • 🪟Windows
      • 📃Everything Windows
      • Windows Tools
        • Hashcat
        • Vagrant
      • Windows Virtual Machines
        • Windows 11 - VM
        • Windows Server 2025 - VM
  • 📝Courses Notes
    • eLearnSecurity / INE
      • eJPT - PTSv2
      • eMAPT
      • ICCA
    • Practical Networking
      • Practical TLS
        • TLS/SSL Overview
        • Cryptography
        • x509 Certificates and Keys
        • Security through Certificates
        • Cipher Suites
        • TLS/SSL Handshake
        • TLS Defenses
        • TLS Attacks & Vulnerabilities
        • What's new in TLS 1.3?
        • TLS 1.3 Under the Hood
        • TLS 1.3 Extensions
        • 🌐Practical TLS References
    • TCM Security
      • Linux101
      • MAPT
      • PEH
  • 🖥️Cyber Everything
    • 📌Generic Resources
      • Cryptography
      • CVSS 3.1
      • Cyber Threat Intelligence (CTI)
    • 📱Mobile
      • Apps Lab
        • Android Rooting Guide
        • iOS Jailbreak Guide
        • Intercepting Android App Traffic
      • OWASP MAS
        • MASTG Techniques
        • MASTG Tests
        • MASTG Theory
        • MASVS Notes
      • Tools
        • MobSF
    • 🧬Network
      • Commands
        • Linux Privesc Commands
        • Networking Commands
    • 🌐Web
      • API
        • API Sec Fundamentals
        • API Penetration Testing
      • PortSwigger Academy
        • Server-Side Topics
        • Client-Side Topics
        • Advanced topics
        • 🔬Vulnerability Labs
    • ✍️Writeups & Walkthroughs
      • 🌩️TryHackMe
        • 📖Learn
          • Cyber Threat Intelligence
          • Intro to Defensive Security
          • Juice Shop
          • Upload Vulnerabilities
        • 🎯Practice
          • Easy
            • Blaster
            • Blue
            • Bolt
            • Chill Hack
            • Ice
            • Ignite
            • Retro
            • Startup
          • Medium
            • Blog
      • 📦HackTheBox
      • 🚩Capture The Flag
  • ♾️DevOps Everything
    • 🔗DevOps Resources
      • Introduction to DevOps
      • Ansible
      • Docker
      • Git
      • Kubernetes
      • Terraform
      • Vim
  • 🔬Home Lab
    • 🖥️Hypervisors
      • Hyper-V
        • Windows WSL
      • Proxmox
        • Proxmox VE
        • Proxmox Upgrade 7 to 8
      • VMware
        • VMware Workstation Pro
    • 🔴Offensive Labs
      • Hashcat Password Cracking
      • Metasploitable3
    • 🔵Defensive Labs
      • Detection Lab
    • ⚪Misc Labs
      • Bitwarden On-Premise
      • OpenWrt & WiFi Exploitation
      • Passbolt CE - Ubuntu Server
Powered by GitBook
On this page
  • 🤝 Introduction
  • ✉️ Contact
  • 🍕 Referrals

Was this helpful?

Edit on GitHub

Home

NextLinux

Last updated 6 days ago

Was this helpful?

🤝 Introduction

Hi, syselement here 🧑‍💻, sharing some interesting Information Technology and Cybersecurity notes and stuff.

Welcome to my notes blog! This blog is intended to provide information and insights on various topics related to Cybersecurity, Ethical Hacking and Systems Administration, based on public open-source material and software, and should not be considered as a substitute for professional advice or guidance.

👈 Check the menu on the left for more!

❗ Disclaimer

The content on this notes blog is intended solely for educational, personal, non-commercial, testing, and research purposes. It must not be used for illegal or malicious activities. The information provided is based on publicly available material, as well as on my own interpretations and commentary, which may not always be up-to-date. Use this content at your own risk. By accessing these notes, you agree to absolve me of any liability. All references and comments from external resources will include a link to the original source.

✏️ Copyright ©️ 2025 syselement

While much of the material in this blog is derived from public sources and is not subject to copyright, my original commentary, analysis, and writing are protected. You are free to share and redistribute this content as long as proper attribution is provided, including a reference to me (syselement) and a link to the utilized resource. Redistribution and adaptations must respect the principles of responsible sharing and this license. Sharing responsibly helps maintain the integrity and value of the work while encouraging collaboration and learning.


✉️ Contact





🍕 Referrals








🔗 (Get 5$ on a Premium Subscription)

🔗

🔗 (Get 10 points with a Pro Subscription)

🔗

🔗 (Italian CyberSecurity Community)

🔗

🏠
TryHackMe
HackTheBox
PentesterLab
PWNX
SecurityCert
KodeKloud
🏠