Owlglass
Search site
Abortion
Abortion and the Supreme Court: Roe V Wade, Dobbs V Jackson, etc
Account Lockout - Splunk
Active Directory
Active Directory: lastLogon vs lastLogonTimestamp
Active Scanning with Scapy
Affine and Projective Spaces
Algorithms
Ansible - Playbook weaponization
AS-REP Roasting
Binary Analysis
Birthday Attack
Bloodhound
C Programming
C++ - STL
C++ and Nix
C++ Programming
Category Theory
ComptTIA Security+
Computer Science
Conditions of Causation
Cracking - PDF
Data Transfer
DLL Hijacking
DNS - Basics
DNS Zone Transfers
Document Object Model (DOM)
Dopamine
Eikonal Approximation
Electrodynamics
Endpoint Detection and Response
Fileless Malware
FTP - retrieve files with Python
Generative Effects: Orders and Galois Connections
Golden Ticket
Google Hacking
Greenhouse Gas Emissions
Happiness
Hashing Vs Encryption
Haskell Programming
Hooking Windows APIs with Python
HTTP/2
icacls
IdentityIQEssentialsIntroduction
Impacket
Information Security
Internet Security Association and Key Management Protocol (ISAKMP)
Intro to Pwntools - TryHackMe
IP Time to Live (TTL)
Kali Linux - Basics
Kerberoasting
Kerberos
Kerberos Authentication
Kerbrute
Lang - Test
Lang - Test
Lateral Movement
linpeas
Malware
Marx
Master Boot Record (MBR)
Maxwell's Equations
Mimikatz
NetBIOS
Nietzsche
Nietzsche and Stoicism
NTLM Authentication
NX
One-way functions
Optics
Org Mode - Python/Jupyter Example
Originalism
OS Identification - Ping
OSINT
Pass the Ticket (PtT) Attack
Pentest - Active Directory
Pentest - Active Directory - Certificate Services
Pentest - Active Directory - DCSync
Pentest - Active Directory - SID-History Injection
Pentest - Active Directory - Skeleton Key
Pentest - Active Information Gathering
Pentest - Antivirus Evasion
Pentest - Exploits
Pentest - Generating Wordlists
Pentest - gRPC Port 50051
Pentest - MSSQL - Microsoft SQL Server p 1433
Pentest - Passive Information Gathering
Pentest - Python
Pentest - SMB p 139,445
Pentest - SQL
Pentest - SSH p 22
Pentest - Stealing Chrome Cookies
Pentest - Windows Privilege Escalation
philosophy
Physics
PIE
Political Science
politics
Port Forwarding
powershell
PowerShell - Add a calculated property in Select-Object
PowerShell - Check Windows Server TLS Settings
PowerShell - Classes
PowerShell - Clipboard to Array
PowerShell - Common Members of two groups
PowerShell - Convert from Unix Time
PowerShell - Custom Execution Timer
PowerShell - Get Domain Controllers in Forest
PowerShell - Lengh limits AD attributes
PowerShell - Log Function
PowerShell - Regex - string between two strings
PowerShell - Rust
PowerShell - Script Encryption
PowerShell - Search-ADAccount
PowerShell - Splatting
PowerShell - Test Credentials
PowerShell - Writing cmdlets in C#
Python - Functional Programming
Python - List Comprehensions
Python - Visualize Active Directory Data
Quantum Mechanics
Quotes and Notes
Recon - AutoRecon
Recon - Port Scanning and Nmap
RELRO
Reverse Shell - Upgrade TTY
Reversing - Java
Reversing - Python
Rust Programming
S_MIME
School Spending and Educational Outcomes
sha1
sha1Cracker
Silver Ticket
SMB - Server Message Block
SMTPS
SNMP
Spacetime
Splunk
SQL Injection
Stack Canaries
Subdomain Enumeration
Testing
The Action Principle
Trump - Policies and Actions
Unredact Pixelized Text
von Neumann Architecture
Web Pentest - Browser Extensions
Web Pentest - Cross-Site Scripting
Web Pentest - Enumeration
Web Pentest - File Upload
Web Pentest - Fuzzing
Web Pentest - JWT
Web Pentest - Spring
Web Pentest - Tools
Web Pentest - Wordpress
wfuzz
Wildcard Certificate
Windows - Cached Credentials as SYSTEM
X11 Authorization
XOR #cryptography
Z3 Basics