Blog

cover image for Getting started with OpenPGP

Getting started with OpenPGP

Cryptographic privacy and authentication for data communication.

cover image for Crypto investigations

Crypto investigations

Detecting the use of cryptocurrencies

cover image for DMDE

DMDE

Brief review of DMDE

cover image for Shakabrah

Shakabrah

Nice easy box I popped last night

cover image for Cracking Protected Files

Cracking Protected Files

A short guide on how to crack protected files.

cover image for Linux Security Basics

Linux Security Basics

Prerequisites include a basic understanding of computers and networking in general

cover image for Intel 13 Gen Build Guide

Intel 13 Gen Build Guide

New workstation build for the new Intel processors

cover image for Intel Forensics Build

Intel Forensics Build

A Intel x86 based workhorse for your lab.

cover image for Forensics Workstation Build

Forensics Workstation Build

A x86 based workhorse for your lab or enterprise.

cover image for Getting started with OpenPGP

Getting started with OpenPGP

Cryptographic privacy and authentication for data communication.

cover image for Virtual Machine Networking

Virtual Machine Networking

Network types for virtual machines

cover image for OSINT

OSINT

My brief overview of an OSINT investigation, and the methodologies used

cover image for Start Programming

Start Programming

The tools I use, extensions and my environment.

cover image for Report writing

Report writing

What do you use to take notes and generate reports for CTF's?

cover image for ATT&CK

ATT&CK

A curated list of tactics taken from MITRE ATT&CK

cover image for Apple Platform Security

Apple Platform Security

May 2022 Edition

cover image for Smart Contract Hacking

Smart Contract Hacking

Recently I was asked for resources surrounding cryptocurrency, the blockchain and the smart contract space, and how to begin and how to hack it.

cover image for Smart contracts?

Smart contracts?

Smart contracts work by following a simple 'if' statement that are written into code.

cover image for Metasploitable 2

Metasploitable 2

How to use Metasploitable 2 on on ARM64!

cover image for Forensic Drive Imaging

Forensic Drive Imaging

Drive imaging and evidence preservation

cover image for OS Basics

OS Basics

Understanding operating systems

cover image for Windows XP on UTM

Windows XP on UTM

Installing Windows XP on the Mac M1

cover image for Canadian Cyber Law

Canadian Cyber Law

A Recent call online for hacktivists to engage..

cover image for Virtualization on Fedora

Virtualization on Fedora

Getting started with virtualization on Fedora

cover image for WARGAMES

WARGAMES

Reducing Cyber Risk with Cyber Attack Simulations

cover image for Networking Part 1

Networking Part 1

A simplified overview of networking basics

cover image for Networking Part 2

Networking Part 2

A simplified overview of networking basics

cover image for Hacking Cheat Sheets

Hacking Cheat Sheets

A small collection of cheat sheets..

cover image for Beginners start here..

Beginners start here..

Many users have the interest to learn, but..

cover image for L00t

L00t

Post exploitation tricks

cover image for Hacking Books

Hacking Books

Best beginner books

cover image for DFIR Resources

DFIR Resources

DFIR resources, tools and free training

cover image for Essentials

Essentials

Resources for beginners

cover image for File Transfers

File Transfers

Various file transfer methods

cover image for Cyber Security 101

Cyber Security 101

Top 10 security actions to protect your organization.