PinnedPublished inThe MayorWhy is Cybersecurity So Special?Addressing the skills gap and antithesis of common senseDec 4, 2024Dec 4, 2024
PinnedPublished inThe MayorCVE Hunting Tips #004Observable Response and Timing DiscrepanciesFeb 25, 2023Feb 25, 2023
PinnedPublished inThe MayorCVE Hunting Tips #002Text Input Denials of ServiceJun 24, 2022Jun 24, 2022
Published inThe MayorBypassing Microsoft Defender SmartScreen — It’s Always DNSMicrosoft SmartScreen is used to identify possibly malicious websites and files. A user sees the following warning when visiting a…Apr 16, 20241Apr 16, 20241
Published inThe MayorCVE Hunting Tips #005Insecure Direct Object References (IDOR) / Broken Object Level Authorization (BOLA)Mar 18, 2024Mar 18, 2024
Published inThe MayorDomain Takeover Without Domain Admin PermissionsWhen the Administrator Group is OverusedJun 29, 20231Jun 29, 20231
Published inThe MayorPython3 Command and Control How to GuideChapter Two — Socket Communications Part 1Apr 4, 2023Apr 4, 2023