IT Security
Backing up the sshd
Buffer overflow in the 64-bit stack - part 1
Buffer overflow in the 64-bit stack - Part 2
Buffer overflow in the 64-bit stack - Part 3
FatCat Attack PoC
Group Managed Service Accounts
Helpful NMAP scanner commands
Host Discovery with Metasploit database
IT Security Cheat Sheets
nmap SMBv1 Scan via Script
OSI layer cyber attacks
Privilege escalation: Windows admin thanks to Linux
Secure passwords
Security on the net
Shellcode Injection Part 1
SMB Hardening