Checkout Kushtaka! A defensive cyber security product I'm building!

Posts

A Parent's Guide to Hacking Test Taking during Covid19

A Winding Road to InfoSec

Import the World, Import the Risk - Exploiting Plot.ly via MathJax.js

How I hacked plot.ly by exploiting an SVG vulnerability in plotly.js

Hacking Concrete5 – ProBlog 2.6.6 & ProEvent 2.8.5 (CSRF, XSS, Side Effects)

When Security Reports Go Ignored – Hacking Concrete5’s ProEvent Plugin

Understanding When To Use Channels Or Mutexes In Go

How To: Shove data into Postgres using Goroutines and GoLang

Hacking Java Bytecode for Programmers (Part4) – Krakatau And The Case Of The Integer Overflow

Hacking Java Bytecode for Programmers (Part3) – Yes, disassemble with Javap ALL OVER THE PLACE!

Hacking Java Bytecode for Programmers (Part2) – Lions, and Tigers, and OP Codes, OH MY!

Hacking Java Bytecode for Programmers (Part1) -The Birds and the Bees of Hex Editing

How to contribute to an open source project

How To: Install FreeTDS and UnixODBC On OSX Using Homebrew For Use With Ruby, Php, And Perl

Kaypro

Newbs, Ruby, Profiling Memory Leaks Using Memprof, And Web Scraping with Mechanize

To Love or to Loan