
How To Use This Site
A Repo for Cluttered Minds. Use each card as a review topic for notebooks. Topics Covered --- Threat Hunting Forensics Cloud Active Directory Appsec Stuff Radio Other Projects --- Threat Hun...
A Repo for Cluttered Minds. Use each card as a review topic for notebooks. Topics Covered --- Threat Hunting Forensics Cloud Active Directory Appsec Stuff Radio Other Projects --- Threat Hun...
Do LLMs Dream of Prompted Sheep? A Basic Example The Hello World version of this is to make a basic text summarizer We will be using Phi-2 as an example. Phi-2 is a small language model from Mic...
Baofeng Menu Reference This is documentation for how to use a Baofeng Radio. I am using a UV-5R8W. Many far more technical and qualified people have done extensive tutorials, so you should check...
Small Book 1 Formal Titles: Threat Detection Forensics Enterprise Security Security Engineering Web Aoo Pentesting/Bug Bounties Email Research Radio/WiFi SCADA Satellites/Deepspace REGEX (\S)(M)...
Namespace Notes This is our layout [Network Layout] 192.168.5.1: Router 192.168.5.2: Bare Metal Host Machine (windows) This is the actual computer hosting all the virtual machines 192.168...
rex field = System_Props_XML (\S)(HTTP)(\s) (\S \s) (?\SM)"
duffle bag for pen test Raw Notes Raw Notes 1 Recon nmap scan reveals two open ports Port Status Info 80 open http (web applicatio...
Raw Notes Raw Notes 1 Raw Notes 2 Raw Notes 3 Raw Notes 4 Tutorials Used https://github.com/weslambert/velociraptor-docker Ironcailly this had nothing to do with docker initially Setup E...
Annotations and quick copy-pastes for MemprocFS, based on 13Cubed’s tutorial. I don’t see a whole lot of other people using this tool but it has been useful so I guess here we are. TLDR SpeedRun C...
Annotations of various tutorials on starting out in Volatility, a python-based tool for Host-Based Forensics and Incident Responders. This tool is for digital investigation, and requires the reposi...