-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.php
81 lines (76 loc) · 3.75 KB
/
index.php
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
<?php include('includes/header.php'); ?>
<section>
<div class="language-python highlighter-rouge"><div class="highlight"><pre class="highlight"><code><span class="c1">## @Author: Sean Bachiller
</span></code></pre></div></div>
<h1 id="objective">0x6e0x650x720x64</h1>
<p>
My name is Sean Bachiller, I am an IT Professional and student based in Toronto, Canada. I like
doing CTFs, building home labs, programming, researching security trends, etc. This is my space for creative and analytical thinking.<br /><br />
This contains some of my research, walkthroughs, and opinions on a broad range of domains such as programming, AI/ML, Computer Systems and Networking, Linux, InfoSec, DevOps, and more along the world of computers and technology.<br /><br />
The objective of this space is to expand and diversify my expertise on the aforementioned fields. I am an avid learner and student who embraces the challenge of learning something new everyday. Check me out on <a href="https://github.com/prodseanb">GitHub</a>.</p>
<br/><br/>
<hr/>
<h2>How To Set Up a Malware Analysis Lab</h2>
<pre><code>## @Date: May 12 2022</pre></code>
<p>
Have you ever considered messing around with a malware sample from sites like <a href="https://www.vx-underground.org/">vx-underground</a>? Do you want to set up an isolated environment where you could deploy your own malicious program
to analyze its impact on the host/network? Don't worry, the process is fairly simple, and I will guide you through the whole thing.
</p>
<h3><a href="/articles/flare-vm-lab/index.php">Read more...</a></h3>
<br/><br/>
<hr/>
<h2>Microsoft Revealed Another Windows Print Spooler Service RCE Vulnerability</h2>
<pre><code>## @Date: Aug 13 2021</pre></code>
<p>
On August 11, 2021, Microsoft revealed yet another Windows 10 Print Spooler remote code execution vulnerability. This flaw is the latest bug in the list
of Print Spooler service vulnerabilities known as the <a href="https://www.redscan.com/news/printnightmare-security-advisory/">PrintNightmare</a>.
</p>
<h3><a href="/articles/microsoft-print-spooler-bug/index.php">Read more...</a></h3>
<br/><br/>
<hr/>
<h2>PHP 8.1.0-dev Backdoor Exploit</h2>
<pre><code>## @Date: Aug 5 2021</pre></code>
<p>
There has been a recent RCE exploit for PHP version 8.1.0-dev, according to PHP repository maintainer Nikita Popov.
Attackers can execute arbitrary code by sending a User-Agentt header on a server running
this PHP version.
</p>
<h3><a href="/articles/php-backdoor-exploit/index.php">Read more...</a></h3>
<br/><br>
<hr/>
<h2>CTFLearn POST Practice</h2>
<pre><code>## @Date: Jul 20 2021</pre></code>
<p>
POST Practice is a <a href="https://ctflearn.com/">CTFLearn</a> web security challenge.
In this short walkthrough, we will learn how to send a basic POST request using Python.
</p>
<h3><a href="/articles/post-practice/index.php">Read more...</a></h3>
<br/><br/>
<hr/>
<h2>How to Scrape Cryptocurrency Data in Python</h2>
<pre><code>## @Date: Jul 19 2021</pre></code>
<p>
Need to keep track of the latest cryptocurrency news and data? In this article, we will be learning how to scrape credible sites
for real-time cryptocurrency data in Python using <a href="https://pypi.org/project/beautifulsoup4/">BeautifulSoup</a>, including the current price, market cap,
24h trading volume, 24h low-high, price change, latest news, etc.
</p>
<h3><a href="/articles/cryptocheck/index.php">Read more...</a></h3>
<br/><br/>
<table>
<th>Media</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://dribbble.com/leanlongo">coding-freak via dribbble</a></td>
</tr>
</tbody>
</table>
<div class="page-nav">
<!--<a href="#" class="previous round">‹Previous</a>-->
<a href="page/2/index.php" class="next round">Next›</a>
</div>
</section>
<?php
include('includes/footer.php');
?>