Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

Everything on this blog is based on personal opinion and should be interoperated as such.

When I took my OSCP exam, I had less than two years of professional experience in the security space.

Obviously with BASIC authentication the user is going to be asked for their credentials.

A tool to find Windows registry files in a blob of data

If you’ve ever seen the movie Dr Strangelove, you may be reminded of General Ripper being terrified of having his […]

incidents affect all three aspects of data security (Confidentiality, Integrity,

I should note that when I say “broken” I mean that it will no longer lift and lower the associated garage door.

The hope is that this informal process demonstrates how to apply a threat hunting mindset to search for malicious activity in your environment but al…

For most people, the main challenge with using Zeek is in setting it up.

View previous queries