Skip to content
-
Security You Can Trust, Expertise You Can Rely On. TekGenX Consulting
NetwerkLABS

Powered By TEKGENX CONSULTING

  • Home
  • BLUE TEAM
    • MITRE ATT&CK
    • INFOSEC Governance and Regulation
      • NIST
        • IDENTIFY
        • PROTECT
        • DETECT
        • RESPOND
        • RECOVER
      • Risk Management
    • SOC
      • Threat Detection and Incident Response
        • Threat Detection EngineeringA practical course on Threat Detection Engineering using Elastic SIEM/EDR
        • Threat Hunting
          • Traffic Analysis
        • Splunk
          • Splunk Basics
          • Understanding Log Sources
          • Dashboards and Reports
          • Exploring SPL
          • Incident Handling with Splunk
          • Investigating with Splunk
    • Security+
    • Scripting
      • Bash Scripting
      • Python
      • ZyBER-TOOLS
  • ZyBER-SERIES
    • Wazuh – SIEM and XDRThe Open Source Security Platform that provides Unified XDR and SIEM protection for endpoints and cloud workloads
    • Attack and Defend Active Directory
    • Offensive Testing Enterprise Networks
    • Threat Detection EngineeringA practical course on Threat Detection Engineering using Elastic SIEM/EDR
    • F5 Local Traffic Manager (LTM)F5 Local Traffic Manager (LTM)
    • Incident Response and Forensics
    • Red Team Engagements
  • ZyBER-INTEL
  • ZyBER-NEWS
  • Cookie Policy (EU)
Subscribe

Posts by Bharath Narayanasamy

  • Home
  • Bharath Narayanasamy
Avatar photo
About Bharath Narayanasamy
Bharath Narayanasamy is the principal cybersecurity consultant at TekGenX, specializing in offensive security, detection engineering, incident response, and GRC. Certified in CySA+, eJPTv2, Security+, CCNA, CCSA, and ISO 27001 Lead Implementer & Lead Auditor, he delivers end-to-end security solutions that transform complex requirements into measurable, resilient outcomes.
Nmap Cheat Sheet
Posted inVulnLAB RED TEAM Purple Teaming

Nmap Cheat Sheet

Nmap Cheat Sheet nmap — cheat sheet Network Mapper · Comprehensive Command Reference 🎯 Target Specification 8 nmap 192.168.1.1·Scan a single IP nmap 192.168.1.1-254·Scan IP range nmap 192.168.1.0/24·Scan CIDR subnet…
Read More
Posted by Avatar photo Bharath Narayanasamy
The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: II)
Posted inRED TEAM

The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: II)

Disclaimer “This guide is for authorized testing in a controlled environment. Obtain written approval before sending any simulated emails.” SekurFinCorp: Phishing Simulation (Credential Capture via a Realistic Banking Lure) In…
Read More
Posted by Avatar photo Bharath Narayanasamy
The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: I)
Posted inRED TEAM

The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: I)

Disclaimer “This guide is for authorized testing in a controlled environment. Obtain written approval before sending any simulated emails.” Installing GoPhish on Ubuntu 24.04 GoPhish provides a complete platform to…
Read More
Posted by Avatar photo Bharath Narayanasamy
RED Teaming: Mythic C2 Framework
Posted inRED TEAM

RED Teaming: Mythic C2 Framework

Disclaimer: This post is created solely for educational and research purposes. The techniques, tools, and concepts discussed are intended to enhance cybersecurity awareness and skills by demonstrating how offensive security testing works. Unauthorized…
Read More
Posted by Avatar photo Bharath Narayanasamy
Installing OpenBAS: The OpenSource Breach and Attack Simulation
Posted inOpenBAS RED TEAM

Installing OpenBAS: The OpenSource Breach and Attack Simulation

Introduction In today's rapidly evolving cybersecurity landscape, organizations need robust tools to test their security posture and validate their defenses. OpenBAS (Open Breach and Attack Simulation) emerges as a powerful…
Read More
Posted by Avatar photo Bharath Narayanasamy
Metasploit Framework (MSFconsole) Cheatsheet
Posted inVulnLAB

Metasploit Framework (MSFconsole) Cheatsheet

Disclaimer: This post is created solely for educational and research purposes. The techniques, tools, and concepts discussed are intended to enhance cybersecurity awareness and skills by demonstrating how offensive security…
Read More
Posted by Avatar photo Bharath Narayanasamy
OpenCTI – Open Source Threat Intelligence Platform: PART I
Posted inVulnLAB

OpenCTI – Open Source Threat Intelligence Platform: PART I

OpenCTI (Open Cyber Threat Intelligence Platform) is a powerful open-source solution designed to help security teams collect, store, organize, and visualize threat intelligence in a structured way. Whether you’re a…
Read More
Posted by Avatar photo Bharath Narayanasamy
SIEM: Onboarding WIndows Servers
Posted inIntrusion Detection and Response DETECT MITRE ATT&CK

SIEM: Onboarding WIndows Servers

When integrating Windows servers into your Security Information and Event Management (SIEM) platform, selecting the right log sources is crucial for effective threat detection while maintaining optimal system performance. This…
Read More
Posted by Avatar photo Bharath Narayanasamy
Command & Control Mastery with Covenant C2: PART-I
Posted inRED TEAM

Command & Control Mastery with Covenant C2: PART-I

In the realm of cybersecurity, especially within red teaming and penetration testing, Command and Control (C2) frameworks are pivotal. They facilitate the management of compromised systems, enabling operators to execute…
Read More
Posted by Avatar photo Bharath Narayanasamy
Active Directory Enumeration with PowerView
Posted inAD² Attacking Active Directory Active Directory

Active Directory Enumeration with PowerView

Complete Active Directory Enumeration Using PowerView PowerView is a powerful PowerShell tool designed to perform detailed enumeration of Active Directory (AD) environments. It is widely used by penetration testers, red…
Read More
Posted by Avatar photo Bharath Narayanasamy

Posts pagination

1 2 3 … 17 Next page

Recent Posts

  • Nmap Cheat Sheet
  • The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: II)
  • The Bait Lab – Phishing Simulations, Practical Campaigns with GoPhish & Evilginx (PART: I)
  • RED Teaming: Mythic C2 Framework
  • Installing OpenBAS: The OpenSource Breach and Attack Simulation

Categories

AD AD attacks brute-force caldera dfir drupal Elastic linux LTM NIST red-team SIEM snort splunk Threat Intel threat_detection Threat_hunting vulnhub wazuh wireshark

Copyright 2026 — NetwerkLABS. Powered by TekGenX Consulting. All rights reserved.
Scroll to Top

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by