Posts

Privacy Engineering ?

Grammarly taking more data than it should, a exploration and musings over the idea of privacy engineering in conjunction with application security assessments
Read more

Beaker.

Running a little port canary for half a year, observations, data, application, and thoughts.
Read more

Publicker

Cross-referencing acquired credentials against public known, known bad credentials in a bid to really hit home the cultural change required. or just fully breaking down a target.
Read more

Go Count Hashes

Get more from your ntds.dit data, generally we acquire this file to maul an environment, but there's a blue way to provide value without cracking a single hash, it's to count them.
Read more

'ExpLoading'

If you have ever dismissed a search order binary plant attack because the folder from where it takes place doesn’t allow for writes without elevation?
Read more