Aleksa ZatezaloinInfoSec Write-upsExploring The Impersonator ShellThe Impersonator Shell was a program aimed at giving a reverse shell the ability to manipulate and abuse Windows access tokens through the…Oct 271Oct 271
Aleksa ZatezaloinLevel Up CodingScraping LinkedIn Data With PythonGathering Data For Red Team EngagementsApr 71Apr 71
Aleksa ZatezaloinLevel Up CodingCreating an Async and Multi-Threaded Port ScannerAn Introduction to creating open source cyber security toolsJan 23Jan 23
Aleksa ZatezaloinLevel Up CodingHuffman Encoding in PythonCreating a lossless compression toolDec 12, 2023Dec 12, 2023
Aleksa ZatezaloinOffensive Security LibraryCreating a Steganography Tool in PythonWhat is SteganographyOct 26, 2023Oct 26, 2023
Aleksa ZatezaloinOffensive Security LibraryWhat was the Cult of The Dead CowWho Were TheySep 9, 20231Sep 9, 20231
Aleksa ZatezaloinOffensive Security LibraryOSCP Proving Grounds Walkthrough: PebbelsPebbles is a vulnerable machine on Offensive Securities Proving Grounds. It’s catagorized as a machine of level “Warm Up” with a community…Aug 30, 2023Aug 30, 2023
Aleksa ZatezaloinOffensive Security LibraryOSCP Proving Ground Walkthrough: BratarinaIntroductionAug 7, 2023Aug 7, 2023
Aleksa ZatezaloinOffensive Security LibraryCreating a Vulnerability Scanner in PythonPenetration TestsJun 20, 20231Jun 20, 20231
Aleksa ZatezaloinOffensive Security LibraryBuilding a TCP ProxyCreating your cyber security tool kit with python3May 16, 2023May 16, 2023