Dirty Cow Vulnerability: An AnalysisThis post was initially published on my blog, please go check it out.Jan 13, 20231Jan 13, 20231
HackerOne CTF: PostbookI recently published an article on a CTF writeup, an introduction to the HackerOne CTF. You can find that article here. Today I am…Jul 21, 20221Jul 21, 20221
Automation with bash!Learn to use bash to automate tasks that you would otherwise repeat on a day to day basis.Mar 30, 2020Mar 30, 2020
Basic Pentesting: 2 WalkthroughThis is a boot2root VM and is a continuation of the Basic Pentesting series. This series is designed to help newcomers to penetration…Jul 26, 2019Jul 26, 2019
Basic Pentesting: 1 WalkthroughThis is a small boot2root VM I created for my university’s cyber security group. It contains multiple remote vulnerabilities and multiple…Jul 18, 2019Jul 18, 2019