A quick overview of triage data acquisition in the context of attack/defend CTFs.
Some post exploitation techniques using gawk.
Accessing Alternate Data Streams on VMDK Images on Linux.
Review of Malware Data Science: Attack Detection and Attribution
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
Configure a git repository's origin as SSH rather than HTTPS.