Active Directory ACL Abuse with Kali LinuxActive Directory Access Control Lists (ACL), and their associated Access Control Entries (ACE), define the entities and permissions of a…May 10May 10
Published inInfoSec Write-upsGame Hacking: Hex Editing Save Files for Unlimited CashAfter creating a Batocera live USB for retro gaming, I instantly started down the path of game hacking and researching how ROM’s (digital…Aug 10, 2023Aug 10, 2023
Published inInfoSec Write-upsDecoding the Airwaves: Tracking Device Movements With WiFiPhoto by Ken Friis Larsen on UnsplashJun 29, 2023Jun 29, 2023
Published inInfoSec Write-upsPythonic Malware Part-2: Reversing Python ExecutablesIn Pythonic Malware Part-1, I demonstrated how Python executables can be used to bypass Windows Defender and successfully launch…Apr 22, 20222Apr 22, 20222
Published inInfoSec Write-upsPythonic Malware: Evading Detection with Compiled ExecutablesCreating Python executables during an offensive security engagement used to be an effective method of evasion. However, this tactic has…Apr 11, 20221Apr 11, 20221
Published inInfoSec Write-upsExploiting Password Reset PoisoningTo date, one of my most lucrative bug bounties came from a password reset poisoning vulnerability. This post walks through the process of…Nov 13, 2021Nov 13, 2021
Published inPython in Plain EnglishExecuting Shell Commands in PythonA comparison of methods, functions, and output.Nov 8, 20211Nov 8, 20211
Published inJavaScript in Plain EnglishImplementing Client-Side Templates with jQueryMaintaining the code base on your own personal blog or website can be a great learning experience. It teaches you about the design and…Apr 3, 2021Apr 3, 2021
Published inInfoSec Write-upsIntro to Bug Bounty Automation: Tool Chaining with BashFeb 17, 2021Feb 17, 2021
Published inInfoSec Write-upsHacking Organizations One Document at a Time With MetadataMetadata is simply defined as data about data. In computer systems, this is used to correctly interpret files and store descriptive…Feb 3, 2021Feb 3, 2021