This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.
Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.
For example, it can generate a heatmap of the most frequently typed letters, most frequently clicked screen location, or how far your mouse cursor ha…
Obviously with BASIC authentication the user is going to be asked for their credentials.
And through a series of circumstances, I ended up taking on the task.
It’s been a bit since I spent some time looking for a web vuln… And this...
For most people, the main challenge with using Zeek is in setting it up.
Besides, I had formed a habit out of it, enjoyed the downtime it gave me and as an insatiable learner, I found it rewarding in every way.
The hope is that this informal process demonstrates how to apply a threat hunting mindset to search for malicious activity in your environment but al…
If you’ve ever seen the movie Dr Strangelove, you may be reminded of General Ripper being terrified of having his […]
I wanted to take a moment to explain how to create a simple "Hello World" PyCommand script that I learned about while working through the modules in …