Review a Docker image
What tools and methods can we use to review whether a Docker Image is secure enough to be used?
Cyber security resources
A list of cyber security resources, being labs, CVE, POC, monitoring, or dev advices
LinkedIn 'One Time Login' Feature
Trying to analyse the LinkedIn 'One Time Login' email method from a security point of view. There's probably something to dig deeper here, and maybe some reasons this feature is abused lately.
Data Loss Prevention & shred
Can the 'shred' command be used for safe DLP policies? What are the risks associed and how can we ensure data are properly destroyed on a device?
Dungeondraft colorables
This articles describes how one could extract resources from DungeonDraft packs, and make them colorable items before loading them back into DD.
Red team tools
Red team tools, notes and resources for attackers
Kenobi - TryHackMe
Exploiting misconfigurations and obsolete softwares to get access to remote shell, and escalate as root using path variable manipulation
Blue - TryHackMe
Get hands into Metasploit, and exploit EternalBlue on Windows 7 machine
Vulnversity - TryHackMe
Ensure we can work on labs (VPN connection) and setup simple reverse shell along with pwncat-cs shells
Blue team tools
Some interesting things to dig into for the blue team and SOC
About Open Redirects
Let's talk about how one could exploit open redirects, which are sometimes considered as 'can never be a vulnerability'
Cmd&Ctrl - Shadow Bank CTF (2020)
Some nice persistent spying XSS payloads I made up when doing ShadowBank CTF at Cmd&Ctrl, along with Xpath injection exploitation with recon-ng
Cracking ARSENAL2 Extended Power (game)
Writeup of cracking ARSENAL 2 Extended Power, showing up that yes, offline thick clients can always be cracked
Spiderlabs CTF (Blackhat US 2020)
Feedbacks, solutions, hints and learns from the Trustwave Spiderlabs CTF held at BlackHat US 2020