Published inLevel Up CodingClippy the Microsoft Vulnerability ScannerRecently, I completed an internal penetration test as part of a client engagement, where I gained remote access to multiple PCs using old…Dec 12, 2024Dec 12, 2024
The 500 Hour RuleWe’ve all heard of the 10,000-hour rule — a guideline for achieving mastery in a skill. But what about the journey before mastery? If…Dec 10, 2024Dec 10, 2024
Published inLevel Up CodingCreating An AI That Plays Snake In CBuilding the classic Snake game in C is a project every programmer should try at least once. It’s a fun way to dive into game development…Nov 14, 2024Nov 14, 2024
Published inInfoSec Write-upsExploring The Impersonator ShellThe Impersonator Shell was a program aimed at giving a reverse shell the ability to manipulate and abuse Windows access tokens through the…Oct 27, 2024Oct 27, 2024
Published inLevel Up CodingScraping LinkedIn Data With PythonGathering Data For Red Team EngagementsApr 7, 20241Apr 7, 20241
Published inLevel Up CodingCreating an Async and Multi-Threaded Port ScannerAn Introduction to creating open source cyber security toolsJan 23, 2024Jan 23, 2024
Published inLevel Up CodingHuffman Encoding in PythonCreating a lossless compression toolDec 12, 2023Dec 12, 2023
Published inOffensive Security LibraryCreating a Steganography Tool in PythonWhat is SteganographyOct 26, 2023Oct 26, 2023
Published inOffensive Security LibraryWhat was the Cult of The Dead CowWho Were TheySep 9, 20231Sep 9, 20231