Some post exploitation techniques using gawk.
Abusing finger.exe to send data over the network
Fun project I did a while back to improve 0x4D31's hassh-utils NSE script.
Quick howto on changing apt/apt-get's User-Agent string.
Read about how one may take advantage of ipv6 neglect.
I deployed a fake SSH server today and studied its traffic overnight.