Accessing Alternate Data Streams on VMDK Images on Linux.
Review of Malware Data Science: Attack Detection and Attribution
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
Configure a git repository's origin as SSH rather than HTTPS.
Abusing finger.exe to send data over the network
Windows Startup Folder locations.
Review of RED TEAM Operator: Malware Development Essentials Course by SEKTOR7 Institute.
A common question that new CTF players have is what kind of hardware and software they should bring to an event. I am writing this post to have general-purpose documentation to point people to. The main takeaways from this write-up: Know the rules of the event.You don't need anything fancy.Your laptop should probably be capable …
Writeup for "EZ crackme" on crackmes.one
Some notes and links related to the Volatility Framework
Quick and dirty way to get Volatility working on Ubuntu 20.04
Notes about Windows Sysinternals tools from a security point of view.