Help
RSS
API
Feed
Maltego
Contact
Domain > cybersecuritynotes.motasem-notes.net
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-11-01
34.198.244.72
(
ClassC
)
2025-11-21
52.2.174.185
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyServer: openresty/1.19.9.1Date: Fri, 21 Nov 2025 12:59:24 GMTContent-Type: text/htmlContent-Length: 175Connection: keep-aliveLocation: https://cybersecuritynotes.motasem-notes.net/ html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>openresty/1.19.9.1/center>/body>/html>
Port 443
HTTP/1.1 200 OKServer: openresty/1.19.9.1Date: Fri, 21 Nov 2025 12:59:25 GMTContent-Type: text/html; charsetutf-8Content-Length: 33596Connection: keep-alivex-revision: f154d5cdc9a7x-gr: PRODlink: https://assets.gumroad.com/packs/css/design-fa29a6a3.css>; relpreload; asstyle; crossoriginanonymous; nopush,https://assets.gumroad.com/assets/application-cbf244e9109e70d7b04497041636f00173a1e588f9b879b3a3ef11f8dfb86e5c.js>; relpreload; asscript; nopushvary: Accept, Originetag: W/f9a5c6e78425e9605e1d07eacd8c8468cache-control: max-age0, private, must-revalidateset-cookie: _gumroad_guidd4a4419d-66d6-4117-91bc-7bb998ed3812; domainmotasem-notes.net; path/; expiresWed, 21 Nov 2035 12:59:25 GMT; httponly; samesitelaxset-cookie: XSRF-TOKENrbLRSoBGo2dPY2npDrW2HK7iEVPTFLB2RrlXSV7rWjk2UaFhsyJny56QE72WWTmsMDxZ2ktZtWIBPepcZzw1aQ; path/; samesitelax; HttpOnlyx-request-id: 21465f93-6636-4b20-8e78-afbe4cebc0a5x-runtime: 0.204695x-original-headers-class: Rack::Headersx-content-type-options: nosniffx-xss-protection: 1; modeblockx-download-options: noopenx-permitted-cross-domain-policies: nonecontent-security-policy: default-src https self; child-src * data: blob:; connect-src self blob: www.dropbox.com api.dropboxapi.com s3.amazonaws.com/gumroad s3.amazonaws.com/gumroad/ gumroad-public-storage.s3.amazonaws.com gumroad-public-storage.s3.amazonaws.com/ s3.amazonaws.com/gumroad-public-storage s3.amazonaws.com/gumroad-public-storage/ www.google.com www.gstatic.com *.facebook.com *.facebook.net *.google-analytics.com *.g.doubleclick.net *.googletagmanager.com analytics.google.com *.analytics.google.com files.gumroad.com/ d1bdh6c3ceakz5.cloudfront.net/ *.braintreegateway.com www.paypalobjects.com *.paypal.com *.braintree-api.com iframe.ly help.gumroad.com gumroad.com wss://cable.gumroad.com assets.gumroad.com; font-src * data: blob:; frame-src * data: blob:; img-src * data: blob:; media-src * data: blob:; object-src * data: blob:; script-src self unsafe-eval ajax.cloudflare.com static.cloudflareinsights.com js.stripe.com api.stripe.com connect-js.stripe.com *.braintreegateway.com *.braintree-api.com www.paypalobjects.com *.paypal.com *.google-analytics.com *.googletagmanager.com optimize.google.com www.googleadservices.com www.google.com www.gstatic.com *.facebook.net *.facebook.com www.dropbox.com s.ytimg.com cdn.iframe.ly platform.twitter.com cdn.jwplayer.com *.jwpcdn.com gumroad.us3.list-manage.com analytics.twitter.com help.gumroad.com unpkg.com/@lottiefiles/lottie-player@latest/ gumroad.com assets.gumroad.com nonce-M9r2FLxGTNsejZRsL8Sz0nnKtJGJ6JPLGvKzb1PGo60 unsafe-inline; style-src self unsafe-inline s.ytimg.com optimize.google.com fonts.googleapis.com assets.gumroad.com; worker-src * data: blob: !DOCTYPE html>html langen> head prefixog: http://ogp.me/ns# fb: http://ogp.me/ns/fb# gumroad: http://ogp.me/ns/fb/gumroad#> link reldns-prefetch href//assets.gumroad.com> link reldns-prefetch href//static-2.gumroad.com> link reldns-prefetch href//public-files.gumroad.com> title inertia>Motasem Hamdan | The Mastermind Study Notes/title> meta nameaction-cable-url contentwss://cable.gumroad.com/cable /> link relstylesheet crossoriginanonymous hrefhttps://assets.gumroad.com/packs/css/design-fa29a6a3.css /> style>@import url(https://fonts.googleapis.com/css2?familyRoboto%20Slab:wght@400;600&displayswap);:root{--accent: 216 14 74;--contrast-accent: 255 255 255;--font-family: Roboto Slab, ABC Favorit, serif;--color: 255 255 255;--primary: var(--color);--contrast-primary: 0 0 0;--filled: 1 2 24;--contrast-filled: var(--color);--body-bg: #010218;--active-bg: rgb(var(--color) / var(--gray-1));--border-alpha: 1}body{background-color:#010218;color:#fff;font-family:Roboto Slab, ABC Favorit, serif}/style> meta namecsrf-param contentauthenticity_token />meta namecsrf-token contentuFIrklG0DzSYnYRA_24ttlTpAMZ_1CLHWpHIMPAoeIcjsVu5YtDLmElu_hRngqIGyjdIT-eZJ9MdFXUlyf8X1w /> meta charsetutf-8> meta content149071038533330 propertyfb:app_id> meta contenthttp://www.facebook.com/gumroad propertyfb:page_id> meta propertytwitter:site value@gumroad> meta contentGumroad propertyog:site_name> meta contentwebsite propertyog:type> meta contentTech & Cyber Security Study Notes namedescription> meta propertytwitter:card contentsummary_large_image> meta contentTech & Cyber Security Study Notes propertyog:description> meta propertyog:image contenthttps://public-files.gumroad.com/7aszi13r2dwf0n8afu1jcghdottc> meta propertyog:image:alt contentSubscribe to Motasem Hamdan | The Mastermind Study Notes on Gumroad> meta propertyog:title contentSubscribe to Motasem Hamdan | The Mastermind Study Notes on Gumroad> meta propertygr:google_analytics:enabled contenttrue> meta propertygr:fb_pixel:enabled contenttrue> meta propertygr:logged_in_user:id content> meta propertygr:environment valueproduction> meta propertygr:page:type content> meta propertygr:facebook_sdk:enabled contentfalse> meta contentinitial-scale 1.0, width device-width nameviewport> meta propertystripe:pk valuepk_live_Db80xIzLPWhKo1byPrnERmym> meta propertystripe:api_version value2023-10-16; risk_in_requirements_betav1> link href/opensearch.xml relsearch typeapplication/opensearchdescription+xml titleGumroad> link hrefhttps://public-files.gumroad.com/l28c9a57g8ay2hlsmarcbt2hfgjc relshortcut icon>/head> body iduser_page classgroup/body custom-domain style> div iddesign-settings data-settings{"font":{"name":"ABC Favorit","url":"https://assets.gumroad.com/assets/ABCFavorit-Regular-26182c8c3addf6e4f8889817249c23b22c93233a8212e5e86574459e4dc926e2.woff2"}} styledisplay: none;>/div> div iduser-agent-info data-settings{"is_mobile":false} styledisplay: none;>/div> div classreact-entry-point styledisplay:contents idAlert-react-component-a87c580e-8ddb-4166-9fa8-95620f249dfd>div rolealert classbg-filled fixed top-4 left-1/2 w-max max-w-calc(100vw-2rem) px-4 py-2 md:max-w-sm invisible styletransform:translateX(-50%) translateY(calc(-100% - var(--spacer-4)));transition:all 0.3s ease-out 0.5s;z-index:var(--z-index-tooltip)>/div>/div> script typeapplication/json classjs-react-on-rails-component data-component-nameAlert data-dom-idAlert-react-component-a87c580e-8ddb-4166-9fa8-95620f249dfd>{initial:null}/script> div classflex flex-col lg:flex-row h-screen> main classflex-1 flex flex-col lg:h-screen overflow-y-auto> div classflex-1 flex flex-col> script typeapplication/json idjs-react-on-rails-context>{railsEnv:production,inMailer:false,i18nLocale:en,i18nDefaultLocale:en,rorVersion:14.0.4,rorPro:false,href:http://cybersecuritynotes.motasem-notes.net/,location:/,scheme:http,host:cybersecuritynotes.motasem-notes.net,port:null,pathname:/,search:null,httpAcceptLanguage:null,design_settings:{font:{name:ABC Favorit,url:https://assets.gumroad.com/assets/ABCFavorit-Regular-26182c8c3addf6e4f8889817249c23b22c93233a8212e5e86574459e4dc926e2.woff2}},domain_settings:{scheme:https,app_domain:gumroad.com,root_domain:gumroad.com,short_domain:gum.co,discover_domain:gumroad.com,third_party_analytics_domain:gumroad-analytics.com,api_domain:api.gumroad.com},user_agent_info:{is_mobile:false},logged_in_user:null,current_seller:null,csp_nonce:M9r2FLxGTNsejZRsL8Sz0nnKtJGJ6JPLGvKzb1PGo60,locale:en-US,feature_flags:{require_email_typo_acknowledgment:true},serverSide:false}/script>div classreact-entry-point styledisplay:contents idProfile-react-component-3d326646-19b1-4fca-bd5a-9f672c0bd9f5>div classprofile>header classrelative z-20 bg-background>section>img classuser-avatar srchttps://public-files.gumroad.com/l28c9a57g8ay2hlsmarcbt2hfgjc altProfile Picture/>a href/ styletext-decoration:none>Motasem Hamdan | The Mastermind Study Notes/a>/section>section>form styleflex-grow:1 novalidate>fieldset class>div classflex gap-2>input typeemail classflex-1 placeholderYour email address value/>button classbutton typesubmit>Subscribe/button>/div>/fieldset>/form>/section>section classlinks>a classbutton hrefhttps://twitter.com/ManMotasem target_blank>span classicon icon-twitter>/span>/a>/section>/header>main>header classgrid grid-cols-1 gap-4 border-b border-border px-4 py-8>h1 classwhitespace-pre-line>Tech & Cyber Security Study Notes/h1>/header>section classrelative border-b border-border px-4 py-8 lg:py-16 idhfN72f92k2u0pXnYICt7KA>div classmx-auto grid w-full max-w-6xl gap-6>div classrich-text -mb-4>/div>/div>/section>section classrelative border-b border-border px-4 py-8 lg:py-16 id3gEN8Xbw0QW17P4xiumW_A>div classmx-auto grid w-full max-w-6xl gap-6>div classgrid grid-cols-1 items-start gap-x-16 gap-y-8>div>div class@container>div classgrid grid-cols-2 gap-4 @xl:grid-cols-3 @3xl:grid-cols-4 @4xl:grid-cols-5 lg:grid-cols-2! lg:@3xl:grid-cols-3! lg:@5xl:grid-cols-4! lg:@7xl:grid-cols-5!>article classproduct-card>figure>img srchttps://public-files.gumroad.com/yq5l2v1vqi0thv2qmdd77t82ju9t/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/cobalt-strike-cheat-sheet?layoutprofile classstretched-link>h4 itemPropname>Cobalt Strike Cheat Sheets/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm1dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content6>$6!-- -->+/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm1dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$6!-- -->+/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/cobalt-strike-cheat-sheet?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/ink1ay8hrkwjtug2gtqc7wk8w9ir/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/Blockchain-security-hacking-notes?layoutprofile classstretched-link>h4 itemPropname>Blockchain Hacking, Development and Security Study Notes/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm2dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content12>$12/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm2dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$12/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/Blockchain-security-hacking-notes?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/pv4c4ug8w56ueqma0olmlodr6oad/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/kiexdy?layoutprofile classstretched-link>h4 itemPropname>Windows Hacking Study Notes & Cheat Sheets/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm3dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content12>$12/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm3dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$12/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/kiexdy?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/rtaiexxq0d0tpj7hynoiw11dmy76/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/hvjlr?layoutprofile classstretched-link>h4 itemPropname>Kubernetes Penetration Testing Study Notes/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm4dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content10>$10/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm4dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$10/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/hvjlr?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/7wpttld98lq735fuez93zk5ukr5z/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/biawk?layoutprofile classstretched-link>h4 itemPropname>Google Cloud Penetration Testing Study Notes/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm5dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content10>$10/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm5dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$10/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/biawk?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/palsq13lowo8m2yydqv63rma7orr/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/dduqm?layoutprofile classstretched-link>h4 itemPropname>AWS Pentesting Study Notes/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm6dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content12>$12/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm6dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$12/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/dduqm?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/f9d75ime2o0yfgz24us3gnhf72gd/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/uhampu?layoutprofile classstretched-link>h4 itemPropname>TryHackMe PT Study Notes (Unofficial)/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm7dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content15>$15/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm7dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$15/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/uhampu?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/6gg8cmmzovtygdtg42y1sua55kuq/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/ufeoxu?layoutprofile classstretched-link>h4 itemPropname>Lateral Movement and Pivoting in Cyber Security Cheat Sheets/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm8dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content5>$5/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm8dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$5/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/ufeoxu?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>article classproduct-card>figure>img srchttps://public-files.gumroad.com/tr7mue7np71h6dwbai7n3czvyvke/>/figure>header>a hrefhttp://cybersecuritynotes.motasem-notes.net/l/jgljaa?layoutprofile classstretched-link>h4 itemPropname>BloodHound Cheat Sheet | V1/h4>/a>/header>footer>div itemscope itemPropoffers itemTypehttps://schema.org/Offer classflex items-center>span classgroup/tooltip relative inline-grid right>span aria-describedby:Rm9dl6: styledisplay:contents>div classrelative grid grid-flow-col border border-r-0 border-border>div classbg-accent px-2 py-1 text-accent-foreground itemPropprice content6>$6/div>div classborder-border border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>div classabsolute top-0 right-px bottom-0 border-accent border-r-transparent border-calc(0.5lh+--spacing(1)) border-l-1>/div>/div>/span>span roletooltip id:Rm9dl6: classabsolute z-30 hidden w-40 max-w-max rounded-md bg-primary p-3 text-primary-foreground group-focus-within/tooltip:block group-hover/tooltip:block top-1/2 -translate-y-1/2 left-full translate-x-2>div classabsolute border-6 border-transparent top-1/2 -translate-y-1/2 right-full border-r-primary>/div>$6/span>/span>link itemPropurl hrefhttp://cybersecuritynotes.motasem-notes.net/l/jgljaa?layoutprofile/>div itemPropavailability hidden>https://schema.org/InStock/div>div itemProppriceCurrency hidden>usd/div>/div>/footer>/article>/div>/div>/div>/div>/div>/section>section classrelative border-b border-border px-4 py-8 lg:py-16 idhNWRV1Y8l5Klof9vhsQVBQ>div classmx-auto grid w-full max-w-6xl gap-6>h2>Recent Updates/h2>a href/p/ccsp-vs-aws-security-specialty-which-one-actually-gets-you-hired classflex justify-between gap-4 border-b border-border py-8 no-underline first:pt-0 last:border-b-0 last:pb-0>div>h2>CCSP vs AWS Security Specialty : Which One Actually Gets You Hired?/h2>time>October 30, 2025/time>/div>span classicon icon-arrow-diagonal-up-right text-lg>/span>/a>a href/p/data-exfiltration-explained-how-to-use-splunk-and-wireshark-to-detect-data-exfiltration-c26adc32-8af9-481a-bbaf-b23f1a73ce04 classflex justify-between gap-4 border-b border-border py-8 no-underline first:pt-0 last:border-b-0 last:pb-0>div>h2>Data Exfiltration Explained: How to Use Splunk and Wireshark to Detect Data Exfiltration/h2>time>October 30, 2025/time>/div>span classicon icon-arrow-diagonal-up-right text-lg>/span>/a>/div>/section>footer classpy-8 text-center lg:py-16>Powered by a hrefhttps://gumroad.com/ classlogo-full aria-labelGumroad>/a>/footer>/main>/div>/div> script typeapplication/json classjs-react-on-rails-component data-component-nameProfile data-dom-idProfile-react-component-3d326646-19b1-4fca-bd5a-9f672c0bd9f5>{currency_code:usd,show_ratings_filter:true,creator_profile:{external_id:4317397952596,avatar_url:https://public-files.gumroad.com/l28c9a57g8ay2hlsmarcbt2hfgjc,name:Motasem Hamdan | The Mastermind Study Notes,twitter_handle:ManMotasem,subdomain:motasemhamdan.gumroad.com},sections:{id:3gEN8Xbw0QW17P4xiumW_A,header:null,type:SellerProfileProductsSection,show_filters:false,default_product_sort:page_layout,search_results:{total:37,tags_data:,filetypes_data:{key:pdf,doc_count:34},products:{id:930Ts-kjkUadB-wTBCv92g,permalink:zevrzn,name:Cobalt Strike Cheat Sheets,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/yq5l2v1vqi0thv2qmdd77t82ju9t,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:600,currency_code:usd,is_pay_what_you_want:true,url:http://cybersecuritynotes.motasem-notes.net/l/cobalt-strike-cheat-sheet?layoutprofile,duration_in_months:null,recurrence:null},{id:pdsHksBmj_K3tNKc_zs8Cg,permalink:kprjg,name:Blockchain Hacking, Development and Security Study Notes,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/ink1ay8hrkwjtug2gtqc7wk8w9ir,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:1200,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/Blockchain-security-hacking-notes?layoutprofile,duration_in_months:null,recurrence:null},{id:JbuuTKc-xp2nXSePcljHGA,permalink:kiexdy,name:Windows Hacking Study Notes \u0026 Cheat Sheets,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/pv4c4ug8w56ueqma0olmlodr6oad,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:1200,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/kiexdy?layoutprofile,duration_in_months:null,recurrence:null},{id:vZ8acRu78YJTxsA15qfpsA,permalink:hvjlr,name:Kubernetes Penetration Testing Study Notes,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/rtaiexxq0d0tpj7hynoiw11dmy76,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:1000,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/hvjlr?layoutprofile,duration_in_months:null,recurrence:null},{id:OA6xyMZtVeTzA8KPNuq0DQ,permalink:biawk,name:Google Cloud Penetration Testing Study Notes,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/7wpttld98lq735fuez93zk5ukr5z,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:1000,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/biawk?layoutprofile,duration_in_months:null,recurrence:null},{id:_nqVKftM0_cE_Wkp7qXBrQ,permalink:dduqm,name:AWS Pentesting Study Notes,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/palsq13lowo8m2yydqv63rma7orr,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:1200,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/dduqm?layoutprofile,duration_in_months:null,recurrence:null},{id:90BB211yxHk3vfy1btzzGw,permalink:uhampu,name:TryHackMe PT Study Notes (Unofficial),seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/f9d75ime2o0yfgz24us3gnhf72gd,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:1500,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/uhampu?layoutprofile,duration_in_months:null,recurrence:null},{id:ok7-pIj0A5X84FFYUbgRfw,permalink:ufeoxu,name:Lateral Movement and Pivoting in Cyber Security Cheat Sheets,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/6gg8cmmzovtygdtg42y1sua55kuq,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:500,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/ufeoxu?layoutprofile,duration_in_months:null,recurrence:null},{id:CkxXlQwO5sBeUgKKTdV6cA,permalink:jgljaa,name:BloodHound Cheat Sheet | V1,seller:null,ratings:{count:0,average:0.0},thumbnail_url:https://public-files.gumroad.com/tr7mue7np71h6dwbai7n3czvyvke,native_type:digital,quantity_remaining:null,is_sales_limited:false,price_cents:600,currency_code:usd,is_pay_what_you_want:false,url:http://cybersecuritynotes.motasem-notes.net/l/jgljaa?layoutprofile,duration_in_months:null,recurrence:null}}},{id:hfN72f92k2u0pXnYICt7KA,header:,type:SellerProfileRichTextSection,text:{type:doc,content:{type:raw,attrs:{url:https://www.youtube.com/watch?v5aZFxA7MGck,html:\u003cdiv\u003e\u003cdiv style\left: 0; width: 100%; height: 0; position: relative; padding-bottom: 56.25%;\\u003e\u003ciframe src\https://cdn.iframe.ly/api/iframe?urlhttps%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D5aZFxA7MGck\u0026key31708e31359468f73bc5b03e9dcab7da\ style\top: 0; left: 0; width: 100%; height: 100%; position: absolute; border: 0;\ allowfullscreen scrolling\no\ allow\accelerometer *; clipboard-write *; encrypted-media *; gyroscope *; picture-in-picture *; web-share *;\\u003e\u003c/iframe\u003e\u003c/div\u003e\u003c/div\u003e,title:About The Study Notes \u0026 Courses,thumbnail:https://i.ytimg.com/vi/5aZFxA7MGck/sddefault.jpg}},{type:paragraph},{type:paragraph,content:{text:The MasterMinds Group is a group of talented authors and writers who are experienced and well-versed across different fields. The group is led by, ,type:text},{type:tiptap-link,attrs:{href:https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/},content:{text:Motasem Hamdan,type:text}},{text:, who is a Cybersecurity content creator and YouTuber.,type:text}},{type:paragraph},{type:paragraph,content:{text:The MasterMinds Group offers students and professionals study notes, book summaries, online courses and references across different work areas such as:,type:text}},{type:bulletList,content:{type:listItem,content:{type:paragraph,content:{text:Cybersecurity \u0026 Hacking,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Information Technology \u0026 System Administration,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Digital Marketing,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Business \u0026 Money,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Fitness \u0026 Health,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Self Improvement,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Data Analytics,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Blogging \u0026 Making Money Online,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Psychology,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Engineering,type:text}}}},{type:paragraph,content:{text:The group offers consultation services in the below areas:,type:text}},{type:bulletList,content:{type:listItem,content:{type:paragraph,content:{text:Cybersecurity Consultation: this includes specialzied-article writing services and malware removal.,type:text}}},{type:listItem,content:{type:paragraph,content:{text:Digital Marketing \u0026 System Administration: this includes SEO, Google \u0026 Meta ads advertising.,type:text}}}},{type:paragraph,content:{text:Contact: ,type:text},{type:tiptap-link,attrs:{href:mailto:consultation@motasem-notes.net},content:{text:consultation@motasem-notes.ne,type:text,marks:{type:link,attrs:{rel:noopener noreferrer nofollow,href:mailto:consultation@motasem-notes.net,class:null,target:_blank}}},{text:t,type:text}}},{type:paragraph,content:{text:YouTube: ,type:text},{text:https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/,type:text,marks:{type:link,attrs:{rel:noopener noreferrer nofollow,href:https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/,class:null,target:_blank}}}},{type:paragraph,content:{text:X: ,type:text},{text:https://x.com/ManMotasem,type:text,marks:{type:link,attrs:{rel:noopener noreferrer nofollow,href:https://x.com/ManMotasem,class:null,target:_blank}}}},{type:paragraph,content:{text:Instagram: ,type:text},{text:https://www.instagram.com/motasem.hamdan.official/,type:text,marks:{type:link,attrs:{rel:noopener noreferrer nofollow,href:https://www.instagram.com/motasem.hamdan.official/,class:null,target:_blank}}}},{type:paragraph,content:{text:Web: ,type:text},{type:tiptap-link,attrs:{href:https://motasem-notes.net/},content:{text:motasem-notes.net,type:text}}}}},{id:hNWRV1Y8l5Klof9vhsQVBQ,header:Recent Updates,type:SellerProfilePostsSection,posts:{id:vdrUxwf9sOyMyONtkvNAHA,name:CCSP vs AWS Security Specialty : Which One Actually Gets You Hired?,slug:ccsp-vs-aws-security-specialty-which-one-actually-gets-you-hired,published_at:2025-10-30T19:25:03Z},{id:2p5DsTvLXmMugcxfpcjDsg,name:Data Exfiltration Explained: How to Use Splunk and Wireshark to Detect Data Exfiltration,slug:data-exfiltration-explained-how-to-use-splunk-and-wireshark-to-detect-data-exfiltration-c26adc32-8af9-481a-bbaf-b23f1a73ce04,published_at:2025-10-30T19:23:56Z}},bio:Tech \u0026 Cyber Security Study Notes,tabs:{name:Products,sections:hfN72f92k2u0pXnYICt7KA,3gEN8Xbw0QW17P4xiumW_A,hNWRV1Y8l5Klof9vhsQVBQ}}/script> /div> /main> /div> script srchttps://assets.gumroad.com/assets/application-cbf244e9109e70d7b04497041636f00173a1e588f9b879b3a3ef11f8dfb86e5c.js>/script> script srchttps://assets.gumroad.com/packs/js/webpack-runtime-42806310bd3e933c6931.js deferdefer>/script>script srchttps://assets.gumroad.com/packs/js/webpack-commons-26244bfad90052f1a51e.js deferdefer>/script>script srchttps://assets.gumroad.com/packs/js/473-bef22482bf374309d0fe.js deferdefer>/script>script srchttps://assets.gumroad.com/packs/js/4310-3bab5eeebb4f2b510654.js deferdefer>/script>script srchttps://assets.gumroad.com/packs/js/user-8fd243a69e62b27067df.js deferdefer>/script> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]