All Posts
- Penetration Testing Amazon's AI Ecosystem: A Practical Guide 2025-11-14
- Practical Penetration Testing Framework for AI/LLM Systems 2025-11-13
- Supply Chain Integrity for Edge Mail Infrastructure: Why a Minimal Self-Hosted Stack Matters 2025-11-10
- Migrating from iRedAdmin to PostfixAdmin on OpenBSD (MariaDB Repair + Dovecot Integration) 2025-11-08
- Zero-Cost DR Snapshots for OpenBSD iRedMail (GPG + Git LFS) 2025-10-30
- Primer: Razor2 + SpamAssassin on OpenBSD (with Amavis) — defensible mail pipeline 2025-10-29
- Primer: multi-domain dynamic DNS on Vultr (no ddclient) — hardened & audited 2025-10-24
- Brevo as an Outbound Smart Host for OpenBSD Postfix (iRedMail/Amavis) 2025-10-20
- Building an Internet-Exposed OpenBSD Server: The Authoritative Guide 2025-10-20
- Using Insomnia to Elevate API Script Development 2025-10-15
- Primer ddclient multi-domain support 2025-10-15
- Primer Effective Vulnerability Disclosure 2025-10-01
- OAuth 2.0 Protocol: Primer introductory Technical briefing 2025-09-24
- Primer: Building Secure, Compliant & Cost-Efficient Domain-Specific LLMs for Cyber-Security & Infrastructure Teams 2025-08-21
- Primer - Converting Python Applications to Go: A Strategic Advantage for Classified Environments 2025-08-20
- Primer - Intro into writing better Cobalt Strike Beacons 2025-06-18
- Primer - Bypassing Cloudflare Protection in Red Team Engagements 2025-06-18
- Enterprise Security Automation Framework: LLM-Powered CodeQL Integration for ACME Critical-Widget 2025-05-22
- Java App Security: Threat Detection, Monitoring & Automated Response 2025-05-14
- Primer - AI collaborative Faraday workflows 2025-05-14
- Cross-Environment UEBA 2025-05-14
- Primer - Privacy focused Messaging 2025-05-13
- Primer AWS WAF - Managing OWASP top 10 rules 2025-05-12
- Burp Primer - WSTG ASVS Burp Vuldb Synk 2025-05-12
- Primer - Java common mistakes 2025-05-12
- Primer - OSINT Guide 2025-05-12
- Primer - SQL common mistakes 2025-05-12
- Burp Primer - Using WSTG and DVWA for WebApp elearning 2025-05-12
- Threat Hunting Primer - Azure IOC Detection Cobalt Strike 2025-05-12
- Threat Hunting Primer - Section 1: Intro & Overview - Cloud Threat Hunting 2025-05-12
- Threat Hunting Primer - Section 2: AWS Primer - Threat Hunting Products 2025-05-12
- Threat Hunting Primer - Section 3: Azure Primer - Azure elements & KQL Deep Dive 2025-05-12
- Threat Hunting Primer - Section 4: GCP Primer -Threat Hunting w/ Google SecOps Integration 2025-05-12
- Threat Hunting Primer - Section 5: YARA Primer -YARA Rules for Cloud Threat Detection 2025-05-12
- Threat Hunting Primer - Section 6: AI-Driven Threat Intelligence Automation 2025-05-12
- Threat Hunting Primer - Section 7: Cross-Cloud Correlation Using Elastic AI 2025-05-12
- Threat Hunting Primer - Section 8: CI/CD Integration for Threat Defense 2025-05-12
- Threat Hunting Primer - Section 9: Conclusion & Next Steps 2025-05-12
- Java Secure Coding: Beyond Oracle’s Guidelines 2025-05-11
- Primer - Java Secure Coding Guide 2025-05-11
- How Not to Write Git Commit Comments 2025-05-11
- How to Work with Anyone and Get Things Done Efficiently 2025-05-11
- UltraDNS Enterprise Security first-look 2025-05-10
- CWE Top 25: Programmatic Errors That Cause Vulnerabilities in Java 2025-05-08
- Java: SAST/DAST/SCA 2025-05-06
- Elastic AI: Yara rules primer for assumed-breach 2025-05-06
- Elastic AI: Yara primer 2025-05-06
- Retool Self-Hosting Installation Guide 2025-04-17
- Course: 5-Day Healthcare Cybersecurity Boot Camp, Medical Device Security 2025-01-12
- The Zero-Trace Vault: A Fully Deniable Encryption System for Extreme Privacy 2023-11-20