SSL Pinning bypass (Android Emulator)How to bypass SSL pinning with an android emulator for pentestingJan 14, 2024·2 min read
OSWE - Advanced Web Attacks and Exploitation - Review (2023)Learn about my experience with the Advanced Web Attacks and Exploitation (AWAE) course, including preparation tips, exam details, and insights gained!Apr 28, 2023·12 min read
Zero-Point Security's Certified Red Team Operator (CRTO) ReviewRed Team Ops is a course that teaches the basic principles, tools and techniques, that are synonymous with red teaming. Students will first cover the core concepts of adversary simulation, command & control, and how to plan an engagement. They will t...Oct 13, 2022·7 min read
Havoc C2: First lookHavoc is a modern and malleable post-exploitation command and control framework, created by @C5pider. I first came into contact with Havoc C2 in April 2022 when it was still a private tool under development. C5pider went on Flangvik's stream to discu...Oct 5, 2022·4 min read
How I Control My Dell PowerEdge R710's Fans Remotely with an APIRemotely monitoring my server's temperature and controlling the fan speed accordingly has been one of the more frustrating things I had to do. But that ends today! (Kind of...) Here's how I solved that issue with Python Flask and ipmitool. [ GitHub -...Jun 10, 2022·4 min read
Follina (CVE-2022-30190)Background CVE-2022-30190 AKA Folina, is a zero-day found in Microsoft Products that allows a remote attacker to run malicious code on the endpoint. This vulnerability exists in the Windows Support Diagnostic Tool and can be exploited with any appli...Jun 5, 2022·4 min read