Kotlin Programming Language - Basic Concepts and Syntax

This article discusses the basic concepts and syntax of the Kotlin programming language, as well as its applications in pen testing and red teaming, including code examples for a port scanner, password cracker, and web crawler, and compares its pros and cons to other languages used in the field.

April 27, 2023 · 7 min · UncleSp1d3r

Computer History - The Dot-Com Bubble

The article covers the history of the dot-com bubble, from the early days of the internet to the rise of venture capital, the height of the dot-com era, the crash, and the aftermath, while also examining its impact on cybersecurity.

April 26, 2023 · 17 min · UncleSp1d3r

IoT Security - Best Practices and Common Vulnerabilities

This article provides a detailed overview of IoT security best practices and common vulnerabilities for an advanced audience of experienced security professionals, covering topics such as secure communication protocols, firmware updates, strong passwords, network segmentation, and more.

April 25, 2023 · 17 min · UncleSp1d3r

Advanced Network Security - Intrusion Prevention Systems (IPS)

This article provides advanced technical details on Intrusion Prevention Systems (IPS), including what they are, how they work, tools and techniques for testing them, and specific examples of open source and commercial IPS systems.

April 24, 2023 · 16 min · UncleSp1d3r

Mythic: An Introduction to the Open Source Post-Exploitation Framework

Mythic is a powerful, open-source post-exploitation framework that offers red teamers and pen testers an extensible and customizable platform with numerous modules, agents, and C2 profiles to enhance their engagements and achieve objectives in various target environments.

April 22, 2023 · 8 min · UncleSp1d3r

Cloud Security - Best Practices and Common Vulnerabilities

This article provides an overview of best practices for cloud security, including secure access to the cloud, encryption to protect data, keeping software up to date, monitoring cloud resources for security events, and using network security best practices, with specific technical examples for AWS, GCP, and Azure.

April 21, 2023 · 27 min · UncleSp1d3r

C Programming Language - Basic Concepts and Syntax

Explore C programming basics, pen testing & red teaming applications, write exploits & shellcode, and compare C to other languages for security pros.

April 20, 2023 · 10 min · UncleSp1d3r

Computer History - The History of Email

This article provides a detailed history of email, including its origins in the early days of computing, the rise of the internet, the introduction of webmail and spam, and the impact of mobile and social technologies, as well as discussing alternative email systems and trivia about email.

April 19, 2023 · 14 min · UncleSp1d3r

Exploit Development - Introduction and Techniques

This article introduces and explains exploit development techniques, best practices, and examples for a technical audience of red teams and pen testers.

April 18, 2023 · 10 min · UncleSp1d3r

Advanced Social Engineering Techniques - Spear Phishing and Whaling

This article discusses advanced social engineering techniques, spear phishing, and whaling for a technical audience, including OSINT, psychology of trust, and elements of effective and ineffective attacks.

April 17, 2023 · 15 min · UncleSp1d3r