Blog
  Published 2024-01-31 Published 2024-01-31- A slightly on the spectrum look at IPv4 addresing and classes
 Published 2023-11-08 Published 2023-11-08- Guide to setting up an Active Directory Domain Controller in VirtualBox using Kali
 Published 2023-09-26 Published 2023-09-26- How to get around PHP disabled_functions utilizing Local File Injection (LFI) and a bit on named pipes and reverse shells.
 Published 2023-07-18 Published 2023-07-18- Exploring remote process DLL Injection, DLL writing, and deploying a gob encoded tcp bind shell.
 Published 2023-07-11 Published 2023-07-11- EDR evasion using rc4 encrypted shellcode by writing a file to disk, downloading rc4 encrypted payloads from a server and injecting them into memory.
 Published 2023-07-08 Published 2023-07-08- Standard Nmap and Metasploit with mimikatz thrown into the mix for fun. Vulnerability and exploit research, privilege escalation, RDP sessions, and a few tricks to spy on the target.
 Published 2023-07-02 Published 2023-07-02- Exploit development from Proofs Of Concept and CVEs. Explore a Ruby exploit, rewrite it in Python. Payload development, authentication development. Just a really good room for coding and how to code with an attackers mindset.
 Published 2023-06-29 Published 2023-06-29- Example syntax and command line argument definitions for the amazing nmap scanner.
 Published 2023-06-29 Published 2023-06-29- Vulnerability scanning using nmap, exploitation using metasploit. Examples of creating a reverse TCP shell, upgrading the shell, process migration, hash cracking, and search to find flags.