All Posts
- Primer - Intro into writing better Cobalt Strike Beacons 2025-06-18
- Primer - Bypassing Cloudflare Protection in Red Team Engagements 2025-06-18
- Java App Security: Threat Detection, Monitoring & Automated Response 2025-05-14
- Primer - AI collaborative Faraday workflows 2025-05-14
- Cross-Environment UEBA 2025-05-14
- Primer - Privacy focused Messaging 2025-05-13
- Primer AWS WAF - Managing OWASP top 10 rules 2025-05-12
- Burp Primer - WSTG ASVS Burp Vuldb Synk 2025-05-12
- Primer - Java common mistakes 2025-05-12
- Primer - OSINT Guide 2025-05-12
- Primer - SQL common mistakes 2025-05-12
- Burp Primer - Using WSTG and DVWA for WebApp elearning 2025-05-12
- Threat Hunting Primer - Azure IOC Detection Cobalt Strike 2025-05-12
- Threat Hunting Primer - Section 1: Intro & Overview - Cloud Threat Hunting 2025-05-12
- Threat Hunting Primer - Section 2: AWS Primer - Threat Hunting Products 2025-05-12
- Threat Hunting Primer - Section 3: Azure Primer - Azure elements & KQL Deep Dive 2025-05-12
- Threat Hunting Primer - Section 4: GCP Primer -Threat Hunting w/ Google SecOps Integration 2025-05-12
- Threat Hunting Primer - Section 5: YARA Primer -YARA Rules for Cloud Threat Detection 2025-05-12
- Threat Hunting Primer - Section 6: AI-Driven Threat Intelligence Automation 2025-05-12
- Threat Hunting Primer - Section 7: Cross-Cloud Correlation Using Elastic AI 2025-05-12
- Threat Hunting Primer - Section 8: CI/CD Integration for Threat Defense 2025-05-12
- Threat Hunting Primer - Section 9: Conclusion & Next Steps 2025-05-12
- Java Secure Coding: Beyond Oracle’s Guidelines 2025-05-11
- Primer - Java Secure Coding Guide 2025-05-11
- How Not to Write Git Commit Comments 2025-05-11
- How to Work with Anyone and Get Things Done Efficiently 2025-05-11
- UltraDNS Enterprise Security first-look 2025-05-10
- CWE Top 25: Programmatic Errors That Cause Vulnerabilities in Java 2025-05-08
- Java: SAST/DAST/SCA 2025-05-06
- Elastic AI: Yara rules primer for assumed-breach 2025-05-06
- Elastic AI: Yara primer 2025-05-06
- Retool Self-Hosting Installation Guide 2025-04-17
- Course: 5-Day Healthcare Cybersecurity Boot Camp, Medical Device Security 2025-01-12
- The Zero-Trace Vault: A Fully Deniable Encryption System for Extreme Privacy 2023-11-20