Owlglass
Search site
Abortion
Abortion and the Supreme Court: Roe V Wade, Dobbs V Jackson, etc
Abundance Politics
Account Lockout - Splunk
Active Directory
Active Directory: lastLogon vs lastLogonTimestamp
Active Scanning with Scapy
Affine and Projective Spaces
Algorithms
Ansible - Playbook weaponization
Application Shimming
AS-REP Roasting
Binary Analysis
Birthday Attack
Breadth-first Search
C Programming
C++ - STL
C++ and Nix
C++ Programming
Category Theory
Collatz conjecture
ComptTIA Security+
Computer Science
Conditions of Causation
Cracking - PDF
Data Transfer
DLL Hijacking
DLL Injection
DNS - Basics
DNS Zone Transfers
Docker Escape
Document Object Model (DOM)
Dopamine
Eikonal Approximation
Electrodynamics
End Times Fascism
Endpoint Detection and Response
File Manipulation
Fileless Malware
FTP - retrieve files with Python
FTP - retrieve files with Python
Generative Effects: Orders and Galois Connections
Golden SAML
Golden Ticket
Google Hacking
Greenhouse Gas Emissions
Happiness
Harvesting NetNTLM
Hashing Vs Encryption
Haskell Programming
Home Ownership
Hooking Windows APIs with Python
HTTP/2
icacls
ICMP Data Exfiltration
IdentityIQEssentialsIntroduction
Impacket
Impacket - Secrets Dump
Information Security
Internet Security Association and Key Management Protocol (ISAKMP)
Intro to Pwntools - TryHackMe
Inverse-Square Potential in Quantum Mechanics
Inverted Totalitarianism
IP Time to Live (TTL)
Junkification of American Life
Kali Linux - Basics
Kerberoasting
Kerberos
Kerberos Authentication
Kerbrute
Lang - Test
Lang - Test
Lateral Movement
linpeas
Malware
Marx
Master Boot Record (MBR)
Maxwell's Equations
Mimikatz
Misconfiguration Manager
NetBIOS
Network Traffic per Process
Neural Networks
ngrok
Nietzsche
Nietzsche and Stoicism
NTLM Authentication
NX
One-way functions
Optics
Org Mode - Python/Jupyter Example
Originalism
OS Identification - Ping
OSINT
Pass the Ticket (PtT) Attack
Peano Axioms
Pentest - Active Directory
Pentest - Active Directory - BloodyAD
Pentest - Active Directory - Certificate Services
Pentest - Active Directory - DACL
Pentest - Active Directory - DCSync
Pentest - Active Directory - DNS
Pentest - Active Directory - DPAPI Backup Key Theft
Pentest - Active Directory - gMSA Dump
Pentest - Active Directory - LDAP Enumeration
Pentest - Active Directory - Shadow Credentials
Pentest - Active Directory - SID-History Injection
Pentest - Active Directory - UAC Bypass
Pentest - Active Information Gathering
Pentest - Antivirus Evasion
Pentest - Azure AD
Pentest - BloodHound
Pentest - Domain Credential Access
Pentest - Exploits
Pentest - Generating Wordlists
Pentest - Git
Pentest - gRPC Port 50051
Pentest - IP Camera
Pentest - LLMs
Pentest - Microsoft Teams
Pentest - MSSQL - Microsoft SQL Server p 1433
Pentest - Passive Information Gathering
Pentest - Password Cracking
Pentest - Persistence - Registry
Pentest - Phishing
Pentest - Python
Pentest - SMB p 139,445
Pentest - SQL
Pentest - SSH p 22
Pentest - Stealing Chrome Cookies
Pentest - Symbolic Links
Pentest - Windows Privilege Escalation
philosophy
Physics
PIE
Political Science
politics
Port Forwarding
powershell
PowerShell - Add a calculated property in Select-Object
PowerShell - Check Windows Server TLS Settings
PowerShell - Classes
PowerShell - Clipboard to Array
PowerShell - Common Members of two groups
PowerShell - Convert from Unix Time
PowerShell - Custom Execution Timer
PowerShell - Get Domain Controllers in Forest
PowerShell - Lengh limits AD attributes
PowerShell - Log Function
PowerShell - Monitor Memory
PowerShell - Regex - string between two strings
PowerShell - Rust
PowerShell - Script Encryption
PowerShell - Search-ADAccount
PowerShell - Splatting
PowerShell - Test Credentials
PowerShell - Writing cmdlets in C#
Python - Data Structures and Algorithms
Python - Functional Programming
Python - List Comprehensions
Python - Visualize Active Directory Data
Quantum Mechanics
Quotes and Notes
Recon - AutoRecon
Recon - Port Scanning and Nmap
RELRO
Renormalization Group
Reverse Shell - Upgrade TTY
Reversing - Java
Reversing - Python
Rubeus
Rust - SHA1 Cracker
Rust Programming
S_MIME
School Spending and Educational Outcomes
sha1
Silver Ticket
Skeleton Key
SMB - Server Message Block
SMTPS
SNMP
Spacetime
Splunk
SQL Injection
Stack Canaries
Subdomain Enumeration
Targeted Kerberoast
Testing
The Action Principle
The Enshittification of American Power
Tor
Trump - Policies and Actions
Underground Empire
Unredact Pixelized Text
von Neumann Architecture
Web Pentest - Browser Extensions
Web Pentest - Chrome Memory
Web Pentest - Cross-Site Scripting
Web Pentest - Enumeration
Web Pentest - File Upload
Web Pentest - Fuzzing
Web Pentest - JWT
Web Pentest - Spring
Web Pentest - Tools
Web Pentest - Wordpress
WebAuthn
wfuzz
Wildcard Certificate
Windows - Cached Credentials as SYSTEM
Windows - Security Fundamentals
Windows - Trusted Platform Module (TPM)
Windows Kernel
Windows Kernel - Object Manager
Windows Kernel - Security Reference Monitor
X11 Authorization
XOR #cryptography
Z3 Basics
Zero-knowledge proofs