Michael MeadeTips for looking for internship/job while in college!When I got into college I had it in my head that you had be a senior/junior to get an internship. This is not the case, you can apply to…Mar 4, 2022Mar 4, 2022
Michael MeadeSetting up a Reverse SSH tunnelThe image above shows the command used to install open-ssh on the machine. After the SSH server is installed now we have to create the RSA…Feb 25, 20221Feb 25, 20221
Michael MeadeinSystem WeaknessHow to hunt for bug bountiesThe first step when looking for bug bounties is to get to know the target.Feb 23, 2022Feb 23, 2022
Michael MeadeRmap: Nmap Scanning in RubyThis tool uses the ruby-nmap gem. Nmap has to be installed on your system for this tool to work. The tool uses the ruby-nmap gem to run the…Feb 21, 2022Feb 21, 2022
Michael MeadeGmail user enumerationA couple of years ago I stumbled across this article. The person who authored the page found an API end point that if a valid Gmail email…Feb 14, 2022Feb 14, 2022
Michael MeadeinSystem WeaknessHacking with RakeRake is a utility that can be used to automate tasks. For a example, if program needs to be set up in a certain way. Rake could be used to…Feb 9, 2022Feb 9, 2022
Michael MeadeHow to keep Monero rpc wallet running 24/7First download the latest version from Monero’s website. This guide will be using Linux 64 bit.Jan 31, 2022Jan 31, 2022
Michael MeadeHacking with Subdomain3Subdomain3 is great tool that can be used to discover subdomains that belong to a website. The tool is written in Python3.Jan 19, 2022Jan 19, 2022
Michael MeadeinSystem WeaknessAnalyzing Python Malwarea detailed look into a Python rat found in pypi.Jan 3, 2022Jan 3, 2022
Michael MeadeMonero Pool SearcherThe tool will use a handful of Monero mining pools API to check to see if a Monero address has mined at the Pool. The program will display…Dec 28, 2021Dec 28, 2021