OSINT TryHackMe: Searchlight IMINT Learn to gather information related to a target using the image and geospatial intelligence OSINT disciplines.
TECHNICAL HTB Academy Walkthrough This time I will be taking on the Academy box, join me on this technical HackTheBox walkthrough.
INFOSEC Secjuice Squeeze 56 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
INFOSEC A Briefing On The Current Status Of Cell Carrier Security The evolution of telecom has lead us to the point where we are never too far away from our phones. It is simply astonishing what we are able to fit in our pockets and what these small computers can do.
OSINT TryHackMe: Web OSINT Writeup Learn the basics of gathering information related to websites using open-source Intelligence research.
INFOSEC Secjuice Squeeze 55 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Unrelease Resource Stream: Sometimes Garbage Collectors Do Not Save Us The problem of not releasing the resources we use is that over time the server fills up with things to do and is no longer able to process incoming requests, causing a disservice.
TECHNICAL HTB Jewel Walkthrough Let's explore an interesting box with an unusual "illogical" passage in this hack-the-box write-up.
INFOSEC Secjuice Squeeze 54 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
OSINT OSINT In The Maritime Environment OSINT plays a key role in the maritime environment when it comes to dealing with piracy and terrorism.
INFOSEC How Privacy Impact Analysis Can Save You From A GDPR Fine Learn how a Data Privacy Impact Analysis can save you from a GDPR fine.
TECHNICAL HTB Doctor Walkthrough This time we will be taking on the HTB Doctor challenge, it seems to be an easy BOX, but perhaps not too easy.
TECHNICAL RegEx: Sequence Is Important Regular Expressions, known as RegEx, are cool,they are extremely useful and allow us to do beautiful things.
OSINT The Curious Case Of The PERL.com Website Hijack An OSINT-based analysis of the perl.com domain hijack incident.
INFOSEC Secjuice Squeeze 53 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Windows Basic Exploitation #3 Part three in our series on Attack Defence Basic Windows Exploitation.
INFOSEC Secjuice Squeeze 52 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Attack Defence: Basic Windows Exploitation #2 Part two of my series discussing Basic Windows Exploitation with Metasploit.
INFOSEC Secjuice Squeeze 51 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
TECHNICAL Attack Defence: Basic Windows Exploitation #1 A closer look at the Attack Defence Basic Windows Exploitation Framework.
INFOSEC Secjuice Squeeze 50 Welcome to the Secjuice Squeeze, a curated selection of security articles and news that you may have missed.
INFOSEC How to Tell if a Website is Dangerous Learn how to use different tools to determine whether a site is dangerous.
TECHNICAL How to Use APIs (explained from scratch) Learn how to use APIs with Python with no prior knowledge of either.