Blog posts, page 3

GitHub commit log OSINT tool

Doing OSINT, you can get good insights from GitHub repositories. In addition to the code itself there are plenty of useful information in the change history, which can be of value to an attacker.

PHDays 8 Standoff

A few hours ago the «Standoff» ended. This is a CTF competition which happens during the PHDays forum.

Auto unlocking encrypted root volumes

Sometimes it is necessary that the system disk is encrypted and the system is loaded automatically. In this short outline I will focus on how to make it work.

Chromium proxying

I like to use Chrome for web application security research. Profiles simplify a number of tests. However, there is a problem: Chrome does not allow you to set proxy and relies on the system settings.

Metasploit tips and tricks

Some metasploit tricks