Russel Van TuylIntroducing Merlin — A cross-platform post-exploitation HTTP/2 Command & Control Tooltl;dr Evade network detection during a penetration test/red team exercise by using a protocol that existing tools aren’t equipped to…Dec 18, 20173Dec 18, 20173
InTowards AIbyRoberto IriondoBreaking CAPTCHA Using Machine Learning in 0.05 SecondsMachine learning model breaks CAPTCHA systems on 33 highly visited websites, concept is based on GANs.Dec 19, 20184Dec 19, 20184
InInfoSec Write-upsbyNir ChakoPing Power — ICMP TunnelAn attacker is often required to face a number of challenges in his activities. Two of these challenges include — . . .Dec 17, 20185Dec 17, 20185
InHackerNoon.combyPatrick F. WilburA hacker intercepted your WiFi traffic, stole your contacts, passwords, & financial data.It’s so easy to monitor the public’s Internet traffic. WiFi isn’t as secure as you might think.Feb 19, 201917Feb 19, 201917
InThe StartupbyE. AldersonThis Is the World’s Only Unbreakable EncryptionBut we can’t use it to save us from the futureJan 24, 202123Jan 24, 202123
cyberWarhawkOSCP(2020) in First Attempt while working Full Time!Passed 1st Attempt. My 3 years long journey to OSCP while working full time at a managerial position. Challenges faced and the path I took.Mar 30, 2021Mar 30, 2021