Pimp Your Kali
There are many people who download, install, and run Kali in it’s default state. Out of the box, Kali comes
Continue readingUpstate South Carolina's DEF CON Group
Security research. A broader work covering a project or exploring a aspect of security, privacy, or policy. Not an opinion.
There are many people who download, install, and run Kali in it’s default state. Out of the box, Kali comes
Continue readingPreface This article is not specific to Information Security or covering any ethical hacking topic. Read on if you have
Continue readingA portion of the monthly meeting features recording of both audio and video. This post documents the setup from the
Continue reading“76 percent of employees at the world’s largest companies reuse passwords across personal and professional accounts” Chip Witt, SpyCloud I
Continue readingUpdate for 2021 coming soon!
Continue readingTL;DR. Prevent your home IP from being banned Simple, cheap Linux server with dynamic, public IP address Route DNS, HTTP,
Continue readingPath to Penetration Tester My path to penetration tester is definitely not a straight line. Looking back, it’s circular. In
Continue readingWebcast and Recording Setup for Meetings TL;DR: Webcast / web conference the meeting to remote attendees using Jitsi Meet Proxy
Continue readingThe basis This project stemmed from reading a medium.com article on Simple AV Evasion with the P4wnP1. Needless to say,
Continue reading