Sofiane HamlaouiWhat You Get After Running an SSH Honeypot for 30 DaysWhat is a honeypot?4 min read·Jun 16, 2024----
Sofiane HamlaouiThe magic of TailscaleIf you have multiple computers in your life including computer-adjacent things like network attached storage it’s likely you’d like to have…7 min read·Jun 14, 2024----
Sofiane HamlaouiTop 15 Penetration Testing Tools for Cybersecurity in 2024To combat the growing number of sophisticated cyber threats, security professionals must stay up-to-date with the latest tools and…6 min read·Jun 14, 2024----
Sofiane HamlaouiВведение в технологию eBPFС помощью eBPF программисты могут выполнять пользовательские байт-коды в ядре без изменения ядра или загрузки модулей ядра. eBPF тесно…5 min read·Jun 28, 2022----
Sofiane HamlaouiIntroduction à la technologie eBPFAvec l’ eBPF, les programmeurs peuvent exécuter des bytecodes personnalisés dans le noyau sans modifier ni charger les modules du noyau (…6 min read·Jun 28, 2022----
Sofiane HamlaouieBPF — Understanding How It WorksIn a lot of scenarios, eBPF is not used directly but indirectly via projects like Cilium, bcc, or bpftrace which provide an abstraction on…6 min read·Jun 28, 2022----
Sofiane HamlaouieBPF — eBPF In Action using BCCAfter explaining the working of eBPF and its architecture, now we are going to try some eBPF programs to see and know what kind of…3 min read·Jun 28, 2022----
Sofiane HamlaouieBPF IntroductionWith eBPF, programmers can execute custom bytecodes in the kernel without modifying the kernel or loading kernel modules. eBPF is closely…5 min read·Jun 28, 2022----
Sofiane HamlaouiWhy using Git and Github ?A lot of people have heard about Github and how the Version Control System is working!2 min read·Sep 4, 2020----
Sofiane HamlaouiUse Telegram bot as a Penetration Testing FrameworkThe idea ? :Using Telegram for Penetration Testing and Cyber Security5 min read·Dec 15, 2019----