Cryptographic privacy and authentication for data communication.
Detecting the use of cryptocurrencies
Brief review of DMDE
Nice easy box I popped last night
A short guide on how to crack protected files.
Prerequisites include a basic understanding of computers and networking in general
New workstation build for the new Intel processors
A Intel x86 based workhorse for your lab.
A x86 based workhorse for your lab or enterprise.
Cryptographic privacy and authentication for data communication.
Network types for virtual machines
My brief overview of an OSINT investigation, and the methodologies used
The tools I use, extensions and my environment.
What do you use to take notes and generate reports for CTF's?
A curated list of tactics taken from MITRE ATT&CK
May 2022 Edition
Recently I was asked for resources surrounding cryptocurrency, the blockchain and the smart contract space, and how to begin and how to hack it.
Smart contracts work by following a simple 'if' statement that are written into code.
How to use Metasploitable 2 on on ARM64!
Drive imaging and evidence preservation
Understanding operating systems
Installing Windows XP on the Mac M1
A Recent call online for hacktivists to engage..
Getting started with virtualization on Fedora
Reducing Cyber Risk with Cyber Attack Simulations
A simplified overview of networking basics
A simplified overview of networking basics
A small collection of cheat sheets..
Many users have the interest to learn, but..
Post exploitation tricks
Best beginner books
DFIR resources, tools and free training
Resources for beginners
Various file transfer methods
Top 10 security actions to protect your organization.