KeyboardSamuraiThe Underbelly of PHP Security: How Obfuscation Makes Malicious Code InvisibleThe Dark Art of PHP Obfuscation: How Hackers Hide in Plain Sight4d ago4d ago
KeyboardSamuraiDIY Wardriving — Building your exploration arsenal PART 3Ok! the final part for this wardriving trilogy is already here!Jun 10Jun 10
KeyboardSamuraiDIY Wardriving: Building Your Wireless Exploration Arsenal — Part 2As promised here’s the second part and some of you been asking lately about the monitoring and observability stacks where we finally…May 12May 12
KeyboardSamuraiDIY Wardriving: Building Your Wireless Exploration Arsenal — Part 1“Wardriving is the act of searching for Wi-Fi wireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for…Nov 28, 2023Nov 28, 2023
KeyboardSamuraiAWS Cloud Security: Navigating the Maze of IsolationDissecting the Isolation MythNov 25, 2023Nov 25, 2023
KeyboardSamuraiUnveiling the Intricacies of Packet Filtering with Wireshark: A Technical Overview Exploration into…In the dynamic landscape of cybersecurity, the role of packet filtering stands paramount as a crucial line of defense against malicious…Nov 19, 2023Nov 19, 2023
KeyboardSamuraiNavigating the Slippery Slope of Cybersecurity: Puddle Attacks and TLS/SSL Dangers! 😱Greetings, cyber voyagers! Today, we embark on a journey through the treacherous terrain of cybersecurity, exploring the subtle dangers of…Nov 14, 2023Nov 14, 2023
KeyboardSamuraiIntroducing AWS Control Tower security controls verifierA story about how to be able to manage large corporate AWS account environments and being security compliance.Sep 26, 2023Sep 26, 2023
KeyboardSamuraiReverse Shells, what they are and how they work?Reverse shells are a powerful concept in the world of cyber-security and penetration testing. They serve as a fundamental tool for security…Aug 28, 2023Aug 28, 2023