How to Submit an Article to Deep Hacking
Learn how to propose and submit articles to Deep Hacking, from proposal approval to the Pull Request, with a Markdown format guide and author page instructions.
123 articles
Learn how to propose and submit articles to Deep Hacking, from proposal approval to the Pull Request, with a Markdown format guide and author page instructions.
Discover how Group Policy Objects (GPO) work in Active Directory: LSDOU processing order, inheritance, security filtering, preferences, and execution context.
Discover what Group Policies are in Active Directory, how GPOs work, their components (GPC and GPT), and how they enable centralized management of user and computer configurations.
Discover the evolution of Deep Hacking from its beginnings in 2021 to becoming an international community platform. Learn about the changes, improvements and the new version built with Astro.
Complete review of INE Security's eMAPT certification: preparation, exam, tips, and whether it's really worth it for mobile pentesting.
Complete review of HackTheBox's CWES certification: preparation, exam, comparison with eWPTX and BSCP, and tips to pass.
Complete review of HackTheBox's CPTS certification: preparation, exam, comparison with OSCP, tips, and final thoughts.
Complete review of HackTricks Training's AzRTE certification: course content, hands-on labs, exam, and my experience as a Certified Azure Red Team Expert 2025.
Oh My Pentest Report is a custom theme for Oh My Zsh designed for pentesters: automatic command logging, dynamic IP display, date/time, and Git support.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏