Advanced Nmap NSE Script Debugging
Learn how to debug Nmap NSE scripts like a pro
Learn how to debug Nmap NSE scripts like a pro
Build a dynamic malware analysis virtual lab with logging to the Elastic Stack / Elastic Cloud
Threat Hunting with Elastic Stack is a solid book and I’d recommend reading it
Setting up Vim for remotely debugging Go code
A smart Log4Shell/Log4j/CVE-2021-44228 scanner
Unlike explicit imports that throw an error at application startup, indirect imports in Python throw them when they are actually used. Excessively permissive except clauses can hide them and result in unexpected behavior. Here’s how to verify them at runtime.
A quick look at how to proxy any application’s traffic through the Tor network.
AWS WAF’s defaults make bypassing trivial in POST requests, even when you enable the AWS Managed Rules