Skip to main content
UncleSp1d3r

UncleSp1d3r

Recent

Firewall Bypass Techniques: Tools and Best Practices

··3473 words·17 mins· loading · loading
This technical article provides a detailed overview of various techniques and tools that can be used to bypass firewalls, including examples and best practices for red teamers and pen testers.

Python: writing high-performance C extensions

··2431 words·12 mins· loading · loading
Learn how to write Python C extensions to speed up critical tasks, with practical examples for penetration testers and red team operators.

Computing in the 1990s: The Development of Cryptography and Cryptographic Standards

··3231 words·16 mins· loading · loading
The 1990s revolutionized cryptography by democratizing advanced encryption techniques, establishing critical standards like Advanced encryption standard (AES) and SSL, and laying the foundation for modern digital security in an era of growing internet connectivity and privacy debates.

Advanced Memory Forensics - Detecting Code Injection Techniques in Linux

··1852 words·9 mins· loading · loading
Advanced memory forensics equips red teams and pen testers with the skills to detect and analyze sophisticated code injection techniques in Linux, using tools like Volatility and GDB to uncover hidden malicious activities and defend against advanced threats.