Posts by tag

opinion

The power of silence

1 minute read

I find silence to be grossly underestimated. We live in an era of permanent distraction. Companies use loud, aggressive marketing in the form of advertisemen...

Why I use a MacBook

7 minute read

In this article, I want to explain why I use a MacBook. I am convinced it is the superior desktop OS, but I also think everyone should use what suits them. I...

Password managers

4 minute read

The Internet nowadays is a very messy place. Identity theft, e-mail confirmations, instant notifications, mobile devices, multiple accounts, data leaks, acco...

Back to top ↑

tip

Post-Exploitation: spawning a shell

3 minute read

Once you have gained shell access on a machine, you will often find the prompt extremely limited, especially if you have used manual exploitation. In these c...

The DEFINITIVE guide to defeating spammers

6 minute read

Nowadays, spamming is a very common technique, and nobody can deny that. Spamming is so cheap that even a 10% opening rate is a tremendous success, because s...

Productivity

17 minute read

In the past, I used to struggle with my productivity, no matter how hard I seemed to study, my grades didn’t reflect it. I was quite stubborn in believing I ...

Back to top ↑

writeup

Unknowndevice64 writeup

4 minute read

This is a short and fun machine available on VulnHub. The machine has no outdated, vulnerable software, but is set up as a fun CTF challenge with a few inten...

bWAPP writeup

5 minute read

bWAPP is a PHP application specifically designed to be exploited. It contains many bugs and vulnerabilities, and allows you to select the security level, sim...

Kuya 1 writeup

8 minute read

This is a relatively easy to crack machine. Let’s start with the basics: Reconnaissance.

Typhoon v1.02 writeup

10 minute read

This is a writeup for the Typhoon v1.02 machine on VulnHub. This is a highly vulnerable machine, with multiple potential entry points. There are four differe...

Back to top ↑

Microsoft

Static analysis tools for Windows

2 minute read

I’m currently studying malware analysis, so I wanted to write a post on the tools I’ve been using recently, to serve as a reference for me and hopefully for ...

My favourite Visual Studio Code extensions

2 minute read

At first, I really disliked Electron and JS-based text editors, like Atom and VSCode, but after learning Vim, and finding many problems with my plug-ins, on ...

Back to top ↑

VulnHub

Unknowndevice64 writeup

4 minute read

This is a short and fun machine available on VulnHub. The machine has no outdated, vulnerable software, but is set up as a fun CTF challenge with a few inten...

Kuya 1 writeup

8 minute read

This is a relatively easy to crack machine. Let’s start with the basics: Reconnaissance.

Typhoon v1.02 writeup

10 minute read

This is a writeup for the Typhoon v1.02 machine on VulnHub. This is a highly vulnerable machine, with multiple potential entry points. There are four differe...

Back to top ↑

Apple

Why I use a MacBook

7 minute read

In this article, I want to explain why I use a MacBook. I am convinced it is the superior desktop OS, but I also think everyone should use what suits them. I...

Back to top ↑

software-rev

Static analysis tools for Windows

2 minute read

I’m currently studying malware analysis, so I wanted to write a post on the tools I’ve been using recently, to serve as a reference for me and hopefully for ...

Back to top ↑

HackTheBox

MSFVenom and Meterpreter: The basics

3 minute read

I just recently successfully gained root (or rather, Administrator, because it’s a Windows box) on the Devel machine in Hack The Box.

The fun begins: HackTheBox.eu

1 minute read

It’s been a while since I joined https://www.hackthebox.eu/. Probably more than a year. And I haven’t really had the time to spend trying to break into the m...

Back to top ↑

hacking

The five phases of ethical hacking

1 minute read

An Ethical Hacker is someone who specialises in computer security through what’s known as “Penetration Testing”, which are series of exercises carried out ag...

Post-Exploitation: spawning a shell

3 minute read

Once you have gained shell access on a machine, you will often find the prompt extremely limited, especially if you have used manual exploitation. In these c...

Back to top ↑

project

Back to top ↑

software-dev

My favourite Visual Studio Code extensions

2 minute read

At first, I really disliked Electron and JS-based text editors, like Atom and VSCode, but after learning Vim, and finding many problems with my plug-ins, on ...

Back to top ↑

static-analysis

Static analysis tools for Windows

2 minute read

I’m currently studying malware analysis, so I wanted to write a post on the tools I’ve been using recently, to serve as a reference for me and hopefully for ...

Back to top ↑

assembly

Back to top ↑

x86

Back to top ↑

productivity

The DEFINITIVE guide to defeating spammers

6 minute read

Nowadays, spamming is a very common technique, and nobody can deny that. Spamming is so cheap that even a 10% opening rate is a tremendous success, because s...

Back to top ↑

privacy

The DEFINITIVE guide to defeating spammers

6 minute read

Nowadays, spamming is a very common technique, and nobody can deny that. Spamming is so cheap that even a 10% opening rate is a tremendous success, because s...

Back to top ↑

Proxmox

Back to top ↑