2025
- 03 May Argument Spoofing
- 13 Jan Parent PID Spoofing
2024
- 13 Dec Early Bird Injection
- 13 Dec Process Hollowing
- 25 Aug Reflected DLL Injection
- 11 Aug PE file structure
- 11 Aug Process Injection: DLL Injection
- 03 Aug Kerberos: From 0 to hero
- 30 Apr DevOping - 5
- 30 Apr DevOping - 4
- 30 Apr DevOping - 3
- 28 Apr DevOping - 2
- 20 Apr DevOping - 1
- 11 Feb JWT Vulnerabilities
- 11 Feb Prototype Pollution
- 19 Jan Request Smuggling
2023
- 03 Dec Cross-Site Scripting (XSS)
- 03 Dec Websockets
- 03 Dec Clickjacking
- 03 Dec Cross-site Request Forgery (CSRF)
- 03 Dec Cross-Origin Resource sharing (CORS)
- 20 Nov XML External Entity
- 10 Nov Race Conditions
- 03 Nov Single-packet Attack
- 28 Oct Path Traversal
- 21 Oct Authentication vulnerabilities
- 30 Sep Advanced Security Information Model (ASIM)
- 27 Aug SQL injection
- 27 Aug NLP-4: Machine Translation
- 30 Apr NLP-3: Vector Space Models
- 28 Mar NLP-2: NLP with Naive Bayes’
- 21 Mar NLP-1: Logistic Regression
- 17 Mar Outlook CVE-2023-23397
- 07 Jan CySA+ Study Content
2022
- 11 Aug OSCP-9: Web-based Vulnerabilities
- 26 Jul Supervised Machine Learning: Regression and Classification
- 26 Jul OSCP-8: Vulnerability Scanning
- 21 Jul OSCP-7: Active Information Gathering
- 19 Jul OSCP-6: Passive Information Gathering
- 16 Jul HTB Timelapse Walktrough
- 16 Jul OSCP-5: Bash Scripting
- 16 Jul OSCP-Starting Point
- 21 Jun Active Directory Basics
- 18 Jun Welcome