Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

As you would expect, office printers are often identified when conducting a penetration test of an office network.

Obviously with BASIC authentication the user is going to be asked for their credentials.

It’s been a bit since I spent some time looking for a web vuln… And this...

Everything on this blog is based on personal opinion and should be interoperated as such.

Access Required There is some access required, as this is privilege escalation.

Explaining Stack5 from ProtoStart series on ARM (azeria-labs) .

Completing the lessons earns you a certificate, so if that’s all you want, then you can stop there.

worldwide pandemic, and the first one to be fully in-person again.

As you may have read in my about page, I am OSCP and OSCE.

View previous queries