Posts
2023
Advanced Nmap NSE Script Debugging
Learn how to debug Nmap NSE scripts like a pro Continue reading Advanced Nmap NSE Script Debugging
2022
Building a Threat Hunting Lab Using Elastic Stack and Vagrant - Part 1
Build a dynamic malware analysis virtual lab with logging to the Elastic Stack / Elastic Cloud Continue reading Building a Threat Hunting Lab Using Elastic Stack and Vagrant - Part 1
Threat Hunting with Elastic
Stack - In-depth Book Review
Threat Hunting with Elastic Stack is a solid book and I’d recommend reading it Continue reading Threat Hunting with Elastic
Stack - In-depth Book Review
Vim, Go and Remote Debugging
Setting up Vim for remotely debugging Go code Continue reading Vim, Go and Remote Debugging
2021
Introducing Log4Shell Sentinel
A smart Log4Shell/Log4j/CVE-2021-44228 scanner Continue reading Introducing Log4Shell Sentinel
Python - Verifying Indirect
Imports At Runtime
Unlike explicit imports that throw an error at application startup, indirect imports in Python throw them when they are actually used. Excessively permissive except clauses can hide them and result in unexpected behavior. Here’s how to verify them at runtime. Continue reading Python - Verifying Indirect
Imports At Runtime
Proxying Application Traffic
Through Tor
A quick look at how to proxy any application’s traffic through the Tor network. Continue reading Proxying Application Traffic
Through Tor
AWS WAF's Dangerous Defaults
AWS WAF’s defaults make bypassing trivial in POST requests, even when you enable the AWS Managed Rules Continue reading AWS WAF's Dangerous Defaults