TECHNICAL HTB Jewel Walkthrough Let's explore an interesting box with an unusual "illogical" passage in this hack-the-box write-up.
INFOSEC Secjuice Squeeze 54 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
OSINT OSINT In The Maritime Environment OSINT plays a key role in the maritime environment when it comes to dealing with piracy and terrorism.
INFOSEC How Privacy Impact Analysis Can Save You From A GDPR Fine Learn how a Data Privacy Impact Analysis can save you from a GDPR fine.
TECHNICAL HTB Doctor Walkthrough This time we will be taking on the HTB Doctor challenge, it seems to be an easy BOX, but perhaps not too easy.
TECHNICAL RegEx: Sequence Is Important Regular Expressions, known as RegEx, are cool,they are extremely useful and allow us to do beautiful things.
OSINT The Curious Case Of The PERL.com Website Hijack An OSINT-based analysis of the perl.com domain hijack incident.
INFOSEC Secjuice Squeeze 53 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Windows Basic Exploitation #3 Part three in our series on Attack Defence Basic Windows Exploitation.
INFOSEC Secjuice Squeeze 52 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Attack Defence: Basic Windows Exploitation #2 Part two of my series discussing Basic Windows Exploitation with Metasploit.
INFOSEC Secjuice Squeeze 51 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Attack Defence: Basic Windows Exploitation #1 A closer look at the Attack Defence Basic Windows Exploitation Framework.
INFOSEC Secjuice Squeeze 50 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
INFOSEC How to Tell if a Website is Dangerous Learn how to use different tools to determine whether a site is dangerous.
TECHNICAL How to Use APIs (explained from scratch) Learn how to use APIs with Python with no prior knowledge of either.
CYBERSEC Using Many Email Addresses to Reduce Your Cybersecurity Risk Using different email addresses as a cybersecurity strategy can reduce our risk. But make sure to follow good security hygiene.
INFOSEC Secjuice Squeeze Volume 49 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
OSINT OSINT & The Intelligence Cycle Part Five: Dissemination Legend intelligence analyst Sinwindie returns with Part Five in his series on the OSINT Intelligence Cycle.
OSINT OSINT - Scraping Deep Web Databases with Python Learn how to scrape deep web databases with Python for OSINT investigations.
INFOSEC Secjuice Squeeze Volume 48 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
OSINT OSINT Guide To Bitcoin Investigations Bitcoin offers a unique opportunity for financial investigation in that an amateur can easily research a given person’s bitcoin usage.