Intercept Linux CLI Tool Traffic

January 11, 2020

A guide on how to intercept Linux CLI tool traffic with Burp Suite

Bypass GuardDuty PenTest Alerts

September 4, 2019

A guide to bypass the GuardDuty PenTest Finding Type

Hijacking IAM Roles and Avoiding Detection

July 1, 2019

A guide on how to steal IAM role keys and use them without being detected

IDOR Attacks

June 4, 2019

An introduction to IDOR attacks

Security Headers: Content Security Policy

December 3, 2018

An in depth overview of the Content Security Policy header

Angular Universal: Some Insights

October 4, 2018

Some advice based on my experience with Angular Universal

OSCP Review

July 23, 2018

My thoughts and experiences with the OSCP

What is OPSEC?

March 6, 2018

An explanation of OPSEC and common failures


July 11, 2017

A short introduction to the client-based, web traffic logging solution: FireTraffic

XSS Attacks

May 2, 2017

A short introduction to cross-site scripting vulnerabilities


April 6, 2017

A background on VPNs and the Streisand Project

FCC, ISPs, and You

March 24, 2017

My thoughts on the recent ruling allowing corporations to analyze customer data

XXE Attack Basics

March 14, 2017

An introduction to exploiting XXE vulnerabilities

Custom Domains With GitHub Pages

March 24, 2017

How to set a custom domain with a GitHub pages site