Static Webhosting With Azure Storage and Cloudflare
Hosting doesn't have to be expensive. Check out how I host this blog site for a couple bucks a year using serverless technologies.
Explore how ChatGPT can serve as an AI assisted science based system to learn anything
Read ArticleHosting doesn't have to be expensive. Check out how I host this blog site for a couple bucks a year using serverless technologies.
Feed your brain some sweet developer goodness from the comfort of your couch
Build an automated on-air indicator using LIFX smart lights and Microsoft Power Automate that changes colors based on your Outlook calendar to signal when you're available, in a meeting, or need focus time.
A starter guide to integreating security within your web application pipeline
The developer inner loop plays an important part in producitivity.
Observe which neighbor has been eating from your trash, all from the comfort of your living room
Building a comprehensive cloud-based monitoring system for solar generation and power consumption using Azure, PowerBI, and the SolarEdge API
Exploiting External Entity (XXE) Injection to get a shell, and abusing a developer's bad habits to escalate to root.
A cybersecurity challenge, demonstrating the exploitation of the Heartbleed vulnerability in OpenSSL and the Dirty COW vulnerability in Linux to exfiltrate sensitive information and gain root user privileges.
A step-by-step guide on exploiting a data validation vulnerability in an image upload plugin, demonstrating how to bypass content filters to execute malicious code and gain unauthorized access to a remote system.
A comprehensive guide on identifying and exploiting buffer overflow vulnerablities in third-party applications, using tools like nmap for system enumeration and vulnerability scanning.
A challenge that highlights the exploitation of broken access controls on a Jenkins installation and poor password practices on a KeePass database to gain unauthorized access and fully compromise the system.
Exploiting a web server that's being used as a development environment by abusing artifacts left behind by the developer
