Sofiane HamlaouiWhat You Get After Running an SSH Honeypot for 30 DaysWhat is a honeypot?Jun 16Jun 16
Sofiane HamlaouiThe magic of TailscaleIf you have multiple computers in your life including computer-adjacent things like network attached storage it’s likely you’d like to have…Jun 14Jun 14
Sofiane HamlaouiTop 15 Penetration Testing Tools for Cybersecurity in 2024To combat the growing number of sophisticated cyber threats, security professionals must stay up-to-date with the latest tools and…Jun 14Jun 14
Sofiane HamlaouiВведение в технологию eBPFС помощью eBPF программисты могут выполнять пользовательские байт-коды в ядре без изменения ядра или загрузки модулей ядра. eBPF тесно…Jun 28, 2022Jun 28, 2022
Sofiane HamlaouiIntroduction à la technologie eBPFAvec l’ eBPF, les programmeurs peuvent exécuter des bytecodes personnalisés dans le noyau sans modifier ni charger les modules du noyau (…Jun 28, 2022Jun 28, 2022
Sofiane HamlaouieBPF — Understanding How It WorksIn a lot of scenarios, eBPF is not used directly but indirectly via projects like Cilium, bcc, or bpftrace which provide an abstraction on…Jun 28, 2022Jun 28, 2022
Sofiane HamlaouieBPF — eBPF In Action using BCCAfter explaining the working of eBPF and its architecture, now we are going to try some eBPF programs to see and know what kind of…Jun 28, 2022Jun 28, 2022
Sofiane HamlaouieBPF IntroductionWith eBPF, programmers can execute custom bytecodes in the kernel without modifying the kernel or loading kernel modules. eBPF is closely…Jun 28, 2022Jun 28, 2022
Sofiane HamlaouiWhy using Git and Github ?A lot of people have heard about Github and how the Version Control System is working!Sep 4, 2020Sep 4, 2020
Sofiane HamlaouiUse Telegram bot as a Penetration Testing FrameworkThe idea ? :Using Telegram for Penetration Testing and Cyber SecurityDec 15, 2019Dec 15, 2019