PinnedJeroen VerhaegheinSystem WeaknessAdvanced Directory Traversal attacks and remediation against windowsDifferent advanced attacks against windowsAug 4, 2023Aug 4, 2023
Jeroen VerhaegheMemory efficient streaming of JSON in .net coreHow to stream large datasets to JSON with a rest API. In one of the latest versions of .net(.net 6) it’s possible to stream data live to…19h ago19h ago
Jeroen VerhaegheDebugging a memory dump with Visual StudioWhen you want to debug an application running on a live environment you could take a memory dump of the current state of the application…20h ago20h ago
Jeroen VerhaegheObscure and fascinating linux distro’sThere are some fascinating and obscure linux distributions out there. Here’s a summary of some that I tested out of curiosity.2d ago2d ago
Jeroen VerhaegheRunning TestContainers in .net with PodmanPodman is a free open-source alternative for docker. With TestContainer we can run unit tests with real dependencies.Aug 2Aug 2
Jeroen VerhaegheCopy a MiFare classic card with the proxmark3 easyMiFare is a type of contactless smart card technology developed by NXP Semiconductors. These cards use radio frequencies to communicate…Jul 14Jul 14
Jeroen VerhaegheLoad performance testing GraphQL with k6Grafana k6 is an open-source load testing tool that makes performance testing easy and productive for engineering teams. At the moment K6…Jul 14Jul 14
Jeroen VerhaegheAttacks and Threats Against Large Language Models (LLMs)How susceptible are AI models to hacking, and what are the primary threats associated with the new AI revolution? Moreover, how can we…May 4May 4
Jeroen VerhaegheKeeping Microsoft Teams always appear onlineMicrosoft Teams is a chat application by Microsoft. When the device is unattended for several seconds a user is set to be not available in…May 1May 1
Jeroen VerhaegheHands-on introduction to OSINTOSINT stands for Open Source Intelligence. It’s the practice of collecting and analyzing information from publicly available sources to…Apr 20Apr 20