Deep Hacking
  • Home
  • Posts
    • Certifications
    • Linux
    • Windows
    • Active Directory
    • Web
    • Mobile Pentesting
    • OSINT
    • Low Level
    • PortSwigger Labs
    • Miscellaneous
  • Hall of Fame
  • Wallpapers
  • About
EN
EN English ES Español
Deep Hacking
  • Home
  • Posts
  • Categories
    • Certifications
    • Linux
    • Windows
    • Active Directory
    • Web
    • Mobile Pentesting
    • OSINT
    • Low Level
    • PortSwigger Labs
    • Miscellaneous
  • Hall of Fame
  • Wallpapers
  • About
  • EN
    EN English ES Español
Deep Hacking

Search posts on Deep Hacking.

How to Submit an Article to Deep Hacking
Miscellaneous

How to Submit an Article to Deep Hacking

Learn how to propose and submit articles to Deep Hacking, from proposal approval to the Pull Request, with a Markdown format guide and author page instructions.

Feb 26, 2026 Juan Antonio González Mena
Feb 26, 2026 Juan Antonio González Mena
How to Submit an Article to Deep Hacking

How to Submit an Article to Deep Hacking

Learn how to propose and submit articles to Deep Hacking, from proposal approval to the Pull Request, with a Markdown format guide and author page instructions.

February 26, 2026 Juan Antonio González Mena
February 26, 2026 Juan Antonio González Mena
Read article
Miscellaneous
How, When, and to Whom GPOs Are Applied
Active Directory

How, When, and to Whom GPOs Are Applied

Discover how Group Policy Objects (GPO) work in Active Directory: LSDOU processing order, inheritance, security filtering, preferences, and execution context.

Feb 14, 2026 Juan Antonio González Mena
Feb 14, 2026 Juan Antonio González Mena
Introduction to Group Policy Objects (GPO) in Active Directory
Active Directory

Introduction to Group Policy Objects (GPO) in Active Directory

Discover what Group Policies are in Active Directory, how GPOs work, their components (GPC and GPT), and how they enable centralized management of user and computer configurations.

Jan 19, 2026 Juan Antonio González Mena
Jan 19, 2026 Juan Antonio González Mena
Deep Hacking: A Path of Changes
Miscellaneous

Deep Hacking: A Path of Changes

Discover the evolution of Deep Hacking from its beginnings in 2021 to becoming an international community platform. Learn about the changes, improvements and the new version built with Astro.

Jan 1, 2026 Juan Antonio González Mena
Jan 1, 2026 Juan Antonio González Mena
eMAPT Review - Mobile Application Penetration Tester 2025
Certifications

eMAPT Review - Mobile Application Penetration Tester 2025

Complete review of INE Security's eMAPT certification: preparation, exam, tips, and whether it's really worth it for mobile pentesting.

Dec 5, 2025 Daniel Moreno
Dec 5, 2025 Daniel Moreno
CWES Review - HackTheBox Certified Web Exploitation Specialist 2025
Certifications

CWES Review - HackTheBox Certified Web Exploitation Specialist 2025

Complete review of HackTheBox's CWES certification: preparation, exam, comparison with eWPTX and BSCP, and tips to pass.

Nov 5, 2025 Daniel Moreno
Nov 5, 2025 Daniel Moreno
CPTS Review - HackTheBox Certified Penetration Testing Specialist 2025
Certifications

CPTS Review - HackTheBox Certified Penetration Testing Specialist 2025

Complete review of HackTheBox's CPTS certification: preparation, exam, comparison with OSCP, tips, and final thoughts.

Oct 13, 2025 Oliver Felix Giovanardi
Oct 13, 2025 Oliver Felix Giovanardi
HackTricks AzRTE Review – Certified Azure Red Team Expert 2025
Certifications

HackTricks AzRTE Review – Certified Azure Red Team Expert 2025

Complete review of HackTricks Training's AzRTE certification: course content, hands-on labs, exam, and my experience as a Certified Azure Red Team Expert 2025.

Jun 2, 2025 Hector Ruiz Ruiz
Jun 2, 2025 Hector Ruiz Ruiz
Oh My Pentest Report - Oh My Zsh Theme for Pentesters
Miscellaneous

Oh My Pentest Report - Oh My Zsh Theme for Pentesters

Oh My Pentest Report is a custom theme for Oh My Zsh designed for pentesters: automatic command logging, dynamic IP display, date/time, and Git support.

May 25, 2025 Juan Antonio González Mena
May 25, 2025 Juan Antonio González Mena
CAI, the Future of AI in Cybersecurity
Miscellaneous

CAI, the Future of AI in Cybersecurity

Discover CAI, the open-source AI framework for automated pentesting: real results on HTB, PortSwigger, and bug bounties, revolutionary offensive and defensive capabilities.

May 12, 2025 Luis Javier Navarrete
May 12, 2025 Luis Javier Navarrete
Offensive Phishing Operations Review - MalDev Academy
Certifications

Offensive Phishing Operations Review - MalDev Academy

Review of the Offensive Phishing Operations course from MalDev Academy: secure phishing infrastructures, detection evasion, anti-bot techniques and AITM with Evilginx.

Apr 29, 2025 Juan Antonio González Mena
Apr 29, 2025 Juan Antonio González Mena
View all articles (123)
☕

Support Deep Hacking!

If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.

Buy me a coffee

Thanks for your support 🙏

Deep Hacking

Your cybersecurity and ethical hacking blog

Contact

juanantonio.gonzalezmena@deephacking.tech

Follow us

Twitter GitHub LinkedIn Discord Twitch

© 2026 Deep Hacking. All rights reserved (including the 0days).

Fueled by a cup of Coffee every morning.