- Building A Malicious JavaScript Detection Pre-Processor For A Chromium Based Browser
- Rolling Back VMWare ESXI Server’s Evaluation License In A Pinch
- Microsoft Finally Put A Built-in Multi-Tabbed Terminal Into Visual Studio
- Bypassing Windows Defender On Post-Exploitation
- I Don’t Know Every Linux Command, I Cheat.sh
- Targeting Key Assets With Open Source Email Reconnaissance
- Configuring PGP Encrypted Facebook Notifications
- Running Arch Linux On Android
- Plugins That Make (Neo)Vim A Usable Terminal IDE
- Cool Tip To Open Up Powershell In A Current Directory from Windows Explorer
- Maintaining C# Class Library Models With Python
- You Really Should Change That Easy Windows Password And Upgrade Already
- Patching String Data Inside Binaries With Ghidra
- Dos And Do Nots To US Spy Implant Tradecraft
- Malicious Portable Executable Detecting With Yara Rules
- Useful Administration Tools In Window’s SysInternals
- IP Ranges You Should Worry About When Scanning The Internet
- Parsing Broken JSON Logs Into Python For Honeypot Data Mining
- Will A Warrant Canary Survive Legal Scrutiny?
- Stealthing Your Virtual Machine For Scambait Adventures
- Protect Your Privacy By Rolling Your Own Virtual Assistant
- Sticking An Attacker In A Honeypot With OpenCanary
- How Covert Intelligence Agents Destroy Reputations Without Even Pressing Charges
- Complex But Quick Windows Deployments With Boxstarter
- Setting Up The Perfect Malware Research Lab
- Play Your Favorite Old DOS Games With DOSBox.
- Maintaining Legacy Support For RDLC Reports When Facing DLL Hell
- Testing Your Router For Vulnerabilities with RouterSploit
- Unleashing theZoo Malware research repository on Windows Sandbox
- Making Linux Server Administration Easier With Webmin
- Hash Cracking With Distributed Computing And Malicious JavaScript
- Fixing a UWP / .Net Core Missing Framework Issue
- Stop Window’s Search From Using Bing And Leaking Your Data
- The Unknown Story of Phil Zimmermann
- What We Can Learn From The Letters Of Bastogne
- Protect Your Family Network With Cloudflare DNS’s Parental Controls
- Disguising A Network Scan With ARP Requests
- Installing Kali Linux On Windows Without 3rd Party Virtualization Software
- Scanning The Entire Internet In Minutes
- Patching A Python Socket To Use SOCKS5 Protocol
- Running Your Own Bulletin Board System In Google Cloud
- Debugging A Class Library Referenced In A Visual Studio Project
- Arch Linux Installation The Easy Way With ArchFi
- Preserve Your Privacy Through DNS Encryption On Windows, Mac, And Linux
- Window’s Defender Can Stop This Simple Keylogger
- Fixing Netbeans 4:3 Scaling Issue
- Installing Security Onion To Your Production ESXI Server
- Who Needs The Electronic Frontier Foundation?
- In Search Of The Best Browsing Experience
- When Judges Authorize Federal Authorities To Commit Computer Crimes
- Mandating Encryption Backdoors Actually Hurts Children (EARN IT Act of 2020)
- Why Systems Administrators Should Stop Using 8.8.8.8 (Google DNS)
- Clean Up Your Windows PC with TRON Script
- Hacking Your Host File To Mitigate Attackers And Other Shady Sites
- Chocolately. The Package Manager Windows Should Have Come With.
- Lawmakers quietly pull back on mysterious “Digital Dollar” in mist of global pandemic
- Installing Arch Linux With Full Encryption Using DM-CRYPT And LUKS
- From Hero To Zero And Back Again. A Guide to Recreating yourself.
- Running Fish Shell in Arch Linux with WSL 2 and the new Windows Terminal.
- When Big Data squeezes everything it can from Social Media
- Virus Contact Tracing? A deep dive into Google and Apple’s new APIs.