2024  14

July  4

Mobile Security - Best Practices for Securing Mobile Devices

July 12, 2024 · 6 min · UncleSp1d3r

Python - Python C Extensions: Writing High-Performance Extensions in C

July 11, 2024 · 7 min · UncleSp1d3r

Computing in the 1990s: The Development of Cryptography and Cryptographic Standards

July 10, 2024 · 16 min · UncleSp1d3r

Advanced Memory Forensics - Detecting Code Injection Techniques in Linux

July 9, 2024 · 9 min · UncleSp1d3r

June  2

Where’s My Prompt? Hacking without a TTY

June 22, 2024 · 8 min · UncleSp1d3r

Computer History - Linux Distros and the Family Tree of a Platform

June 5, 2024 · 10 min · UncleSp1d3r

May  8

Rust Concurrency: Techniques for Writing Concurrent and Parallel Programs

May 23, 2024 · 6 min · UncleSp1d3r

Advanced Exploit Development - Heap Exploitation Techniques

May 21, 2024 · 8 min · UncleSp1d3r

Red Teaming - Advanced Physical Security Bypass Techniques

May 20, 2024 · 6 min · UncleSp1d3r

Network Security - Network Segmentation and Micro-Segmentation

May 17, 2024 · 10 min · UncleSp1d3r

Computing in the 1980s: The Emergence of Object-Oriented Programming and the Emergence of C++

May 14, 2024 · 13 min · UncleSp1d3r

Cyber Threat Hunting - Threat Hunting with YARA Rules

May 13, 2024 · 7 min · UncleSp1d3r

JavaScript - Building Real-Time Applications with Socket.io

May 9, 2024 · 6 min · UncleSp1d3r

Computer History: Ambitious Failures: The Untold Stories of Apple’s 1990s Experiments

May 8, 2024 · 10 min · UncleSp1d3r

2023  130

August  4

Incident Response - Best Practices and Techniques

August 18, 2023 · 4 min · UncleSp1d3r

Computer History: The Development of Programming Languages

August 16, 2023 · 14 min · UncleSp1d3r

Advanced Threat Hunting - Memory Forensics-Based Threat Hunting Techniques

August 15, 2023 · 4 min · UncleSp1d3r

Red Teaming - OSINT Techniques for Social Engineering

August 14, 2023 · 4 min · UncleSp1d3r

July  5

Cloud Security - Serverless Security Best Practices

July 7, 2023 · 4 min · UncleSp1d3r

Python - Advanced Python Debugging: Debugging Performance and Memory Issues

July 6, 2023 · 4 min · UncleSp1d3r

Computer History: The Role of Atari in the Home Computing Market

July 5, 2023 · 13 min · UncleSp1d3r

Advanced Malware Analysis - Dynamic Analysis Techniques

July 4, 2023 · 6 min · UncleSp1d3r

Cyber Threat Intelligence - Dark Web Analysis and TOR Investigations

July 3, 2023 · 19 min · UncleSp1d3r

June  22

IoT Security - Securing Smart Cities and Critical Infrastructure

June 30, 2023 · 11 min · UncleSp1d3r

Ruby - Rails Routing: Advanced Routing Concepts and Techniques

June 29, 2023 · 8 min · UncleSp1d3r

Computer History: The Birth of Gaming Consoles with the Release of the Nintendo Entertainment System

June 28, 2023 · 14 min · UncleSp1d3r

Advanced Threat Hunting - Fileless Malware Detection Techniques

June 27, 2023 · 8 min · UncleSp1d3r

Purple Teaming - Integrating Red and Blue Team Operations

June 26, 2023 · 6 min · UncleSp1d3r

Advanced Social Engineering - Vishing and Smishing

June 23, 2023 · 7 min · UncleSp1d3r

Python - Python Libraries for Data Science: Exploring Pandas, Numpy, and Other Popular Libraries

June 22, 2023 · 7 min · UncleSp1d3r

Computer History: The Emergence of Graphical User Interfaces and Windowing Systems

June 21, 2023 · 17 min · UncleSp1d3r

Advanced Memory Forensics - Malware Detection and Analysis

June 20, 2023 · 7 min · UncleSp1d3r

Cyber Threat Intelligence - Collection and Analysis Techniques

June 19, 2023 · 10 min · UncleSp1d3r

Advanced Web Application Security - Server-Side Request Forgery (SSRF)

June 16, 2023 · 7 min · UncleSp1d3r

Rust - Rust Memory Management: Advanced Concepts and Techniques

June 15, 2023 · 11 min · UncleSp1d3r

Computer History - The Development of CD-ROM Technology

June 14, 2023 · 11 min · UncleSp1d3r

Advanced Exploit Development - Return-Oriented Programming (ROP)

June 13, 2023 · 14 min · UncleSp1d3r

Cyber Threat Hunting - Techniques and Best Practices

June 12, 2023 · 14 min · UncleSp1d3r

Network Protocol Analysis - Wireshark and tcpdump

June 9, 2023 · 9 min · UncleSp1d3r

JavaScript - Advanced DOM Manipulation: Techniques for Manipulating the Document Object Model (DOM)

June 8, 2023 · 6 min · UncleSp1d3r

Computer History - The Role of the Commodore 64 in the Home Computing Market

June 7, 2023 · 21 min · UncleSp1d3r

Advanced Malware Analysis - Static Analysis Techniques

June 6, 2023 · 7 min · UncleSp1d3r

Red Teaming - Physical Security Bypass Techniques

June 5, 2023 · 12 min · UncleSp1d3r

Advanced Cloud Security - Serverless Security and Misconfiguration

June 2, 2023 · 8 min · UncleSp1d3r

Python - Object-Oriented Programming in Python: Advanced Concepts and Techniques

June 1, 2023 · 11 min · UncleSp1d3r

May  23

Computer History - Computing in the 1980s: The Development of the Apple Macintosh

May 31, 2023 · 30 min · UncleSp1d3r

Malware Obfuscation - Techniques and Best Practices

May 30, 2023 · 9 min · UncleSp1d3r

Cybersecurity Frameworks - NIST, ISO, and CIS

May 29, 2023 · 8 min · UncleSp1d3r

Wireless Security - Best Practices and Common Attacks

May 26, 2023 · 38 min · UncleSp1d3r

Metaprogramming in Ruby: Techniques for Writing Code that Writes Code

May 25, 2023 · 5 min · UncleSp1d3r

History - Computing in the 1990s: The Emergence of Linux and Open-Source Software

May 24, 2023 · 19 min · UncleSp1d3r

Advanced Threat Hunting Techniques - TTP Analysis

May 23, 2023 · 14 min · UncleSp1d3r

Red Teaming - Scenario-Based Testing

May 22, 2023 · 16 min · UncleSp1d3r

Advanced Malware Analysis - Disassembly Techniques

May 19, 2023 · 19 min · UncleSp1d3r

Lua Programming Language - Basic Concepts and Syntax

May 18, 2023 · 9 min · UncleSp1d3r

Computer History - The Birth of the Intel x86 Architecture

May 17, 2023 · 12 min · UncleSp1d3r

Industrial Control System (ICS) Security - Best Practices and Common Vulnerabilities

May 16, 2023 · 36 min · UncleSp1d3r

Advanced Network Security - Application Layer Firewalls

May 15, 2023 · 18 min · UncleSp1d3r

Red Team Operations - Covert Channels and Exfiltration Techniques

May 12, 2023 · 12 min · UncleSp1d3r

PowerShell Scripting - Basic Concepts and Syntax

May 11, 2023 · 7 min · UncleSp1d3r

Computer History - The History of Apple Computers

May 10, 2023 · 65 min · UncleSp1d3r

Cyber Threat Intelligence - Best Practices and Techniques

May 9, 2023 · 5 min · UncleSp1d3r

Advanced Exploit Development - Heap Spraying Techniques

May 8, 2023 · 9 min · UncleSp1d3r

Blue Team Exercises - Threat Hunting and Incident Response

May 5, 2023 · 34 min · UncleSp1d3r

C++ Programming Language - Basic Concepts and Syntax

May 4, 2023 · 9 min · UncleSp1d3r

Computer History - The History of IBM and the Clone Wars

May 3, 2023 · 16 min · UncleSp1d3r

Advanced Memory Forensics - Analysis Techniques

May 2, 2023 · 14 min · UncleSp1d3r

Web Application Security - CSRF and XSS Prevention

May 1, 2023 · 9 min · UncleSp1d3r

April  25

BloodHound: Analyzing Active Directory for Security Risks and Attack Paths

April 29, 2023 · 8 min · UncleSp1d3r

Advanced Red Team Exercises - Supply Chain Attacks

April 28, 2023 · 14 min · UncleSp1d3r

Kotlin Programming Language - Basic Concepts and Syntax

April 27, 2023 · 7 min · UncleSp1d3r

Computer History - The Dot-Com Bubble

April 26, 2023 · 17 min · UncleSp1d3r

IoT Security - Best Practices and Common Vulnerabilities

April 25, 2023 · 17 min · UncleSp1d3r

Advanced Network Security - Intrusion Prevention Systems (IPS)

April 24, 2023 · 16 min · UncleSp1d3r

Mythic: An Introduction to the Open Source Post-Exploitation Framework

April 22, 2023 · 8 min · UncleSp1d3r

Cloud Security - Best Practices and Common Vulnerabilities

April 21, 2023 · 27 min · UncleSp1d3r

C Programming Language - Basic Concepts and Syntax

April 20, 2023 · 10 min · UncleSp1d3r

Computer History - The History of Email

April 19, 2023 · 14 min · UncleSp1d3r

Exploit Development - Introduction and Techniques

April 18, 2023 · 10 min · UncleSp1d3r

Advanced Social Engineering Techniques - Spear Phishing and Whaling

April 17, 2023 · 15 min · UncleSp1d3r

SharpSocks: A .NET-Based Proxy for Red Teaming and Network Penetration Testing

April 15, 2023 · 5 min · UncleSp1d3r

Red Team Exercises - Simulating Real-World Attacks

April 14, 2023 · 8 min · UncleSp1d3r

Swift Programming Language - Basic Concepts and Syntax

April 13, 2023 · 11 min · UncleSp1d3r

Computer History - The Evolution of Video Games

April 12, 2023 · 15 min · UncleSp1d3r

Advanced Malware Analysis - Dynamic Analysis Techniques

April 11, 2023 · 8 min · UncleSp1d3r

Physical Security Testing - Techniques and Best Practices

April 10, 2023 · 15 min · UncleSp1d3r

Covenant: Command and Control for Red Teaming and Post-Exploitation Operations

April 8, 2023 · 7 min · UncleSp1d3r

Hacking IoT Devices - Techniques and Real-World Examples

April 7, 2023 · 10 min · UncleSp1d3r

Java Programming Language - Basic Concepts and Syntax

April 6, 2023 · 8 min · UncleSp1d3r

Computer History - The Birth of the Internet

April 5, 2023 · 36 min · UncleSp1d3r

Ransomware - Analysis and Prevention

April 4, 2023 · 8 min · UncleSp1d3r

Firewall Bypass Techniques - Tools and Best Practices

April 3, 2023 · 6 min · UncleSp1d3r

Nishang: PowerShell Scripts for Penetration Testing and Red Teaming

April 1, 2023 · 6 min · UncleSp1d3r

March  26

Advanced Web Application Attacks - CSRF and XXE

March 31, 2023 · 8 min · UncleSp1d3r

Go Programming Language - Basic Concepts and Syntax

March 30, 2023 · 13 min · UncleSp1d3r

Computer History - The Evolution of Computer Graphics

March 29, 2023 · 6 min · UncleSp1d3r

Memory Forensics - Analysis and Techniques

March 28, 2023 · 8 min · UncleSp1d3r

Social Engineering - Pretexting Techniques

March 27, 2023 · 7 min · UncleSp1d3r

Empire: A Comprehensive Red Teaming Framework Built on PowerShell

March 25, 2023 · 7 min · UncleSp1d3r

Advanced Network Attacks - DDoS and Botnet Techniques

March 24, 2023 · 9 min · UncleSp1d3r

Python Programming Language - Basic Concepts and Syntax

March 23, 2023 · 7 min · UncleSp1d3r

Computer History - The Y2K Bug and its Impact on Technology

March 22, 2023 · 12 min · UncleSp1d3r

Malware Analysis - Introduction and Basic Concepts

March 21, 2023 · 5 min · UncleSp1d3r

Password Cracking Techniques - Tools and Best Practices

March 20, 2023 · 11 min · UncleSp1d3r

PowerSploit: Using PowerShell for Offensive Security Operations

March 18, 2023 · 8 min · UncleSp1d3r

Phishing Attacks - Detection and Prevention

March 17, 2023 · 16 min · UncleSp1d3r

Efficient Web Development with Rails - Best Practices and Tips

March 16, 2023 · 10 min · UncleSp1d3r

Computer History - The Rise and Fall of Netscape Navigator

March 15, 2023 · 21 min · UncleSp1d3r

Buffer Overflow Exploits - Introduction and Exploitation

March 14, 2023 · 10 min · UncleSp1d3r

Red Teaming - Basic Concepts and Frameworks

March 13, 2023 · 6 min · UncleSp1d3r

Metasploit Framework: An Overview of the Open Source Penetration Testing Tool

March 11, 2023 · 7 min · UncleSp1d3r

Social Engineering - Techniques and Real-World Examples

March 10, 2023 · 7 min · UncleSp1d3r

Nim Programming Language - Basic Concepts and Syntax

March 9, 2023 · 11 min · UncleSp1d3r

Computer History - The Origins and Evolution of Unix

March 8, 2023 · 13 min · UncleSp1d3r

Reverse Engineering - Introduction and Basic Concepts

March 7, 2023 · 8 min · UncleSp1d3r

Network Scanning and Enumeration - Tools and techniques

March 6, 2023 · 12 min · UncleSp1d3r

Web Application Security - Advanced SQL Injection techniques

March 3, 2023 · 7 min · UncleSp1d3r

Rust Programming Language - Basic concepts and coding practices

March 2, 2023 · 11 min · UncleSp1d3r

Computer History - A Brief History of the Computer Mouse

March 1, 2023 · 10 min · UncleSp1d3r

February  24

Cross-Site Scripting (XSS) Attack - Understanding and exploiting

February 28, 2023 · 7 min · UncleSp1d3r

Introduction to Penetration Testing - Basic concepts and methodology

February 27, 2023 · 7 min · UncleSp1d3r

Understanding macOS’s Unix Underpinnings for Linux Red Team Members

February 26, 2023 · 15 min · UncleSp1d3r

Psexec for Remote Code Execution

February 25, 2023 · 6 min · UncleSp1d3r

Using sc.exe on Windows for Remote Execution

February 24, 2023 · 5 min · UncleSp1d3r

Microcode - The Lowest Layer of Software Stack

February 23, 2023 · 6 min · UncleSp1d3r

Using DSQuery for Red Team: A Guide to Gathering Information on Active Directory Environments

February 21, 2023 · 6 min · UncleSp1d3r

Powerful Windows Systems Administration Command-Line Tools for Advanced Red Team Members

February 20, 2023 · 8 min · UncleSp1d3r

Transferring Data from MySQL Database with Docker, mysqldump, and Pgloader.

February 18, 2023 · 8 min · UncleSp1d3r

Chisel - Tunneling Traffic with SSH over HTTP

February 17, 2023 · 11 min · UncleSp1d3r

Using xfreerdp and Pass-the-Hash for RDP Connection

February 16, 2023 · 4 min · UncleSp1d3r

Tunneling Traffic through a Network: Techniques for Combining Iptables Port Bends, SSH Tunnels, and Netsh Port Proxies

February 15, 2023 · 9 min · UncleSp1d3r

How to Use Impacket Example Scripts to Access Microsoft SQL Server from Linux

February 14, 2023 · 3 min · UncleSp1d3r

Using Impacket to Access Windows Shares from Linux

February 12, 2023 · 4 min · UncleSp1d3r

Basic Introduction to smbclient

February 10, 2023 · 9 min · UncleSp1d3r

Efficient Remote File Transfers: Using SCP and SSH with a Master Control Socket

February 9, 2023 · 12 min · UncleSp1d3r

Ruby Programming Language - Basic concepts and coding practices

February 9, 2023 · 10 min · UncleSp1d3r

Disabling Command History in Linux Shells for Red Team Operations

February 8, 2023 · 5 min · UncleSp1d3r

Alternate Data Streams on Windows NTFS: A Red Team’s Guide to Hiding and Detecting Hidden Data

February 7, 2023 · 4 min · UncleSp1d3r

Port Scanning on Linux and Windows

February 5, 2023 · 7 min · UncleSp1d3r

How to Install Impacket

February 4, 2023 · 7 min · UncleSp1d3r

Bash Scripting Language - Basic Concepts and Syntax

February 2, 2023 · 10 min · UncleSp1d3r

Computer History - The Rise and Fall of CP/M

February 1, 2023 · 7 min · UncleSp1d3r

Using WMIC for Red Teaming: A Guide for Pen Testers and Red Team Members

February 1, 2023 · 7 min · UncleSp1d3r

January  1

Initial Linux Enumeration - Best Practices and Techniques for Gathering Information about a Linux System

January 31, 2023 · 9 min · UncleSp1d3r