PinnedR. Eric KiserinInfoSec Write-upsPenetration Testing Microsoft Copilot 365Using Automated Prompts to Discover Sensitive DataMar 16Mar 16
PinnedR. Eric KiserinInfoSec Write-upsPython Penetration Testing: Being a Linux Control Freak!How I control multiple services on multiple Linux Servers at once!Mar 28, 20231Mar 28, 20231
PinnedR. Eric KiserinInfoSec Write-upsPython Penetration Testing: Get out of the Box!Building a Undetectable Windows Keylogger and Sending the Data to a External Google formMar 21, 20231Mar 21, 20231
PinnedR. Eric KiserinSystem WeaknessPython Penetration Testing: Capturing and filtering web application packets to harvest credentialsR. Eric KiserMar 9, 20231Mar 9, 20231
PinnedR. Eric KiserinSystem WeaknessPenetration testing: Collecting Important Windows Files Using PythonR. Eric KiserFeb 14, 2023Feb 14, 2023
R. Eric KiserinSystem WeaknessCybersecurity: Managing the LiarStrategies for Managing Untruthful Users During Incident Response6d ago6d ago
R. Eric KiserinInfoSec Write-upsEstablishing Remote SSH Connections from Windows to Kali LinuxSetting up SSH keys to a Remote Kali Linux VMJun 17Jun 17
R. Eric KiserinInfoSec Write-upsArtificial Intelligence SecuritySecuring Sensitive Data in Copilot for Microsoft 365Feb 20Feb 20
R. Eric KiserMicrosoft 0365 DLP BugsWork around for data loss prevention bugs that cause data lossSep 21, 2023Sep 21, 2023
R. Eric KiserinInfoSec Write-upsMastering the Dance with Digital Recruitment GatekeepersHow I Easily Import Resumes into Applicant Tracking Systems (ATS)Jul 16, 2023Jul 16, 2023