Recent
Firewall Bypass Techniques: Tools and Best Practices
··3473 words·17 mins·
loading
·
loading
This technical article provides a detailed overview of various techniques and tools that can be used to bypass firewalls, including examples and best practices for red teamers and pen testers.
Mobile security: best practices for securing mobile devices
··1245 words·6 mins·
loading
·
loading
Securing mobile devices requires layered controls, disciplined patching, and continuous monitoring to protect from evolving threats in a connected environment.
Python: writing high-performance C extensions
··2431 words·12 mins·
loading
·
loading
Learn how to write Python C extensions to speed up critical tasks, with practical examples for penetration testers and red team operators.
Computing in the 1990s: The Development of Cryptography and Cryptographic Standards
··3231 words·16 mins·
loading
·
loading
The 1990s revolutionized cryptography by democratizing advanced encryption techniques, establishing critical standards like Advanced encryption standard (AES) and SSL, and laying the foundation for modern digital security in an era of growing internet connectivity and privacy debates.
Advanced Memory Forensics - Detecting Code Injection Techniques in Linux
··1852 words·9 mins·
loading
·
loading
Advanced memory forensics equips red teams and pen testers with the skills to detect and analyze sophisticated code injection techniques in Linux, using tools like Volatility and GDB to uncover hidden malicious activities and defend against advanced threats.