INFOSEC Windows 10 as a pentest OS Well, you might be surprised, especially if you're a die-hard GNU/Linux user like me, that you can actually use Windows 10 as a penetration testing operating system!
INFOSEC Advanced boolean-based SQLi filter bypass techniques Learn how to bypass filters and Application Firewall rules using MySQL String Functions, Regex Functions, Conditional Select and Set Variables to exploit a blind (boolean-based) SQL Injection vulnerability.
OSINT OSINT & The Intelligence Cycle Part II: Lets Talk About Collection Part two of my guide to the OSINT intelligence cycle. Once you mapped out your planning and direction phase, the next step is collection.
TECHNICAL HTB Remote WalkThrough Welcome to my HTB Remote walk through, I found this to be a challenging machine despite other users rating this as simple!
TECHNICAL A Brief Introduction To XSS An introduction to cross-site scripting (XSS), including the basics, the methodology, the dangers and mitigations against XSS attacks.
TECHNICAL THM Kenobi Write Up Learn to exploit and take over a vulnerable Linux based machine with the 'Kenobi' room on TryhackMe.
CYBERSEC Autonomous Vehicle Cybersecurity Self driving cars are one of the most heavily anticipated innovations of the 21st century, but the potential cybersecurity risks cannot be ignored.
OSINT The OSINT Intelligence Cycle Part 1: Planning and Direction My advice for those wishing to improve their OSINT skills is to go back to the basics, namely the intelligence cycle.
INFOSEC Secjuice Squeeze Volume 36 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
TECHNICAL TryHackMe WriteUp: Linux Challenges This write-up goes through finding flags on a Linux Machine using different commands, services, and tools found in Linux Operating System.
INFOSEC Risk Management Framework (RMF) Can Help You Develop A Secure System An overview of the Risk Management Framework (RMF) and its components.
CYBERSEC AWS CDK vs Serverless Framework Let's compare Serverless Framework and AWS CDK for framework ease of use, extensibility, and security.
TECHNICAL cors/sop/origin Cross origin requests, let's talk about cors, sop and origin and how these security measures can lead to vulnerabilities in your applications.
CYBERSEC Spyse Geek Out In this article I am going to geek out over Spyse, a new cybersecurity search engine I have started using.
TECHNICAL XSS: Arithmetic Operators & Optional Chaining To Bypass Filters & Sanitization How to use JavaScript Arithmetic Operators and Optional Chaining to bypass input validation, sanitization and HTML Entity Encoding.
INFOSEC Secjuice Squeeze Volume 35 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
INFOSEC Deep Learning & Cybersecurity: Part 3 of 5 - Data Gathering Part 3 of our Cyber Deep Learning series where we talk about the most crucial part of any machine learning project: Data Gathering.
TECHNICAL HackTheBox "Find the Secret Flag" Reversing Challenge Welcome to my technical write up of the new HackTheBox reversing tutorial 'Fund The Secret Flag'.
TECHNICAL Exploiting With Eternal Blue Learn how to exploit operating system-level vulnerabilities and gain root on the target machine with External Blue.
TECHNICAL Hacker 101 CTF: Photo Gallery A technical writeup of the hacker101 ctf (photo gallery). It containts the answers, so do not read if you are working on it.
INFOSEC Secjuice Squeeze Volume 34 Welcome to the Secjuice Squeeze, a curated selection of interesting infosec articles and news that you may have missed. Now with upcoming events!
TECHNICAL TryHackMe WriteUp - Simple CTF If you are a beginner who wants to learn about CTF's, this TryHackMe room is perfect for you!