Learn how to use dpkg, rpm, and other related tools to find malware on your systems.
Exit Values on Windows
Exit values on Windows are much more robust than on *nix systems. Here are some notes about exit values on Windows

My Never-ending Quest to Break Gscript
I was victimized by gscript at a CTF. Here is how I dealt with it.
Building a Hardened Shell For Attack/Defend CTF Supremacy
Harden bash shells against pesky red teamers.
Nmap + HASSH = <3
Fun project I did a while back to improve 0x4D31's hassh-utils NSE script.
Changing apt’s User-Agent string
Quick howto on changing apt/apt-get's User-Agent string.
Review of SANS Webcast – Gearing up for 2019 – Best Practices to Consider
My review of the SANS webcast Gearing up for 2019 - Best Practices to Consider
Keeping Nmap Scan History
Logging nmap scans using bash/zsh functions.
packet_write_wait: Connection to X.X.X.X port 22: Broken pipe
How to fix packet_write_wait: Connection to X.X.X.X port 22: Broken pipe in VMWare Workstation guests.
Protected: Job Interview Blunders
There is no excerpt because this is a protected post.
Bypassing IPv4 Security Measures Using IPv6
Read about how one may take advantage of ipv6 neglect.
SLAE #7: Shellcode Crypter for Linux/x86
Introduction This blog series has been created for completing the requirements of the SecurityTube Linux Assembly Expert certification: http://securitytube-training.com/online-courses/securitytube-linux-assembly-expert/ Student ID: SLAE-877 To get the code provided in this exercise: % git clone https://github.com/droberson/SLAE.git The code will be within the Assignment-7 directory. RC4 I decided to use the RC4 algorithm due to the fact that …