vk9-sec.com Open in urlscan Pro
2a02:4780:b:744:0:1eb1:95ff:1  Public Scan

Submitted URL: http://vk9-sec.com/
Effective URL: https://vk9-sec.com/
Submission: On May 05 via api from GB — Scanned from GB

Form analysis 1 forms found in the DOM

GET https://vk9-sec.com/

<form role="search" method="get" class="et_pb_searchform" action="https://vk9-sec.com/">
  <div>
    <label class="screen-reader-text" for="s">Search for:</label>
    <input type="text" name="s" placeholder="" class="et_pb_s" style="height: 42.0156px; padding-right: 90px;">
    <input type="hidden" name="et_pb_searchform_submit" value="et_search_proccess">
    <input type="hidden" name="et_pb_include_posts" value="yes">
    <input type="submit" value="Search" class="et_pb_searchsubmit" style="">
  </div>
</form>

Text Content

Login | Register


VK9 SECURITY

 * Home
 * Red Team
   * Anonymity
     * Anonymity
   * Information Gathering
     * Active Gathering
     * Passive Gathering
   * Exploitation
     * Android Exploitation
     * Linux Exploitation
     * Windows Exploitation
     * Network
     * Application
       * Web Exploitation
   * Post-Exploitation
     * Linux Post-Exploitation
     * WIndows Post-Exploitation
     * Cleaning Tracks
   * Red Team Operations
   * Reporting
   * Tools
 * Blue-Team
   * Incident Response
   * OS
     * Linux OS
       * Linux Management
       * Linux Commands
       * Linux Misc
     * Windows OS
       * Windows Commands
       * Windows Misc
       * Windows Management
   * Device Configuration
 * Labs
   * Labs
 * About Us

 * Home
 * Red Team
   * Anonymity
     * Anonymity
   * Information Gathering
     * Active Gathering
     * Passive Gathering
   * Exploitation
     * Android Exploitation
     * Linux Exploitation
     * Windows Exploitation
     * Network
     * Application
       * Web Exploitation
   * Post-Exploitation
     * Linux Post-Exploitation
     * WIndows Post-Exploitation
     * Cleaning Tracks
   * Red Team Operations
   * Reporting
   * Tools
 * Blue-Team
   * Incident Response
   * OS
     * Linux OS
       * Linux Management
       * Linux Commands
       * Linux Misc
     * Windows OS
       * Windows Commands
       * Windows Misc
       * Windows Management
   * Device Configuration
 * Labs
   * Labs
 * About Us

Search for:


LEARNING IS FOR


EVERYONE.

Content about Cyber Security. 

View courses



LEARN NEW SKILLS

Offensive techniques

Defensive techniques



View More


ONLINE COURSES

In high-demand fields like Cybersecurity analyst, Penetration tester, Infracture
architect

View More


BE UP TO DATE WITH THE LATEST THREATS

We post updated content that can help security researchers test emerging threats
and techniques.

View More


UP YOUR SKILL

With on-demand training and development programs.

View More


FREE CONTENT AREA.

RED TEAM

BLUE TEAM

LAB CONFIGRATION

PREMIUM COURSES


WHY A THIS SITE?


THIS THIS A PERFECT PLACE TO LEARN MORE ABOUT CYBER SECURITY

All the material that is written here is designed with the main porpuse of
educating profesionals on how to perform technical tasks properly in the same
website.

Learn More


QUALITY CAN BE BETTER THAN QUANTITY IN THIS PLATFORM

Content creation is the main goal of this site, we are committed to provide
first class content to anyone.

Learn More
PreviousNext
12


About the team



We are VK9 Security a project created in 2019 with the porpuse of sharing the
knowledge I learn through time with other people. This is my jorney into the
Cyber Security field.




BRYAN ALFARO

CEO & Founder

Cyber Security engineer specialist in defensive, as well as, offensive
techniques.

"I believe knowledge should be available and free to anyone"

 * Twitter
 * LinkedIn

Learn More

MAKE YOUR DREAMS HAPPEN


WHAT WE OFFER FOR GROWTH

We offer content for anyone to be informed about the cyber space from basic to
advanced techniques. All knowledge learned here will help you persue a Cyber
Security carreer or become a better profesional.

All techniques seen here are for educational porpuses, Vk9 Security nor myself
is responsible for the use of the material.

OFFENSEIVE TECHNIQUES

Information Gathering

Vulnerability analysis and scanning

Exploitation & Post-Exploitation techniques

Persistance

Reporting, etc

DEFENSIVE TECHNIQUES

Incident Response

Threat hunting

Device configuration & management

Mostly Windows & Linux

LABS

Learn about programming

Environment set up

Labs set up

Some other crazy stuff


OUR COMPANY & PARTNERS




 * Twitter
 * Instagram

VK9 Security.