Unlocking Infinite Knowledge With ChatGPT
Unlocking Infinite Knowledge With ChatGPT

Unlocking Infinite Knowledge With ChatGPT

Explore how ChatGPT can serve as an AI assisted science based system to learn anything

Read Article
Scroll for more
Static Webhosting With Azure Storage and Cloudflare

Static Webhosting With Azure Storage and Cloudflare

Hosting doesn't have to be expensive. Check out how I host this blog site for a couple bucks a year using serverless technologies.

Netflix for Nerds: Microsoft Build 2020 Edition

Netflix for Nerds: Microsoft Build 2020 Edition

Feed your brain some sweet developer goodness from the comfort of your couch

Create an on Air Indicator With Lifx and Microsoft Power Automate

Create an on Air Indicator With Lifx and Microsoft Power Automate

Build an automated on-air indicator using LIFX smart lights and Microsoft Power Automate that changes colors based on your Outlook calendar to signal when you're available, in a meeting, or need focus time.

With Great Apps Comes Great Responsibiity

With Great Apps Comes Great Responsibiity

A starter guide to integreating security within your web application pipeline

Closing the developer inner loop with Powershell and Bash

Closing the developer inner loop with Powershell and Bash

The developer inner loop plays an important part in producitivity.

Setup Unifi Protect Cameras on an Echo Show 5

Setup Unifi Protect Cameras on an Echo Show 5

Observe which neighbor has been eating from your trash, all from the comfort of your living room

Monitoring My Solar System From the Cloud

Monitoring My Solar System From the Cloud

Building a comprehensive cloud-based monitoring system for solar generation and power consumption using Azure, PowerBI, and the SolarEdge API

Aragog

Aragog

Exploiting External Entity (XXE) Injection to get a shell, and abusing a developer's bad habits to escalate to root.

Valentine

Valentine

A cybersecurity challenge, demonstrating the exploitation of the Heartbleed vulnerability in OpenSSL and the Dirty COW vulnerability in Linux to exfiltrate sensitive information and gain root user privileges.

Nibbles

Nibbles

A step-by-step guide on exploiting a data validation vulnerability in an image upload plugin, demonstrating how to bypass content filters to execute malicious code and gain unauthorized access to a remote system.

Chatterbox

Chatterbox

A comprehensive guide on identifying and exploiting buffer overflow vulnerablities in third-party applications, using tools like nmap for system enumeration and vulnerability scanning.

Jeeves

Jeeves

A challenge that highlights the exploitation of broken access controls on a Jenkins installation and poor password practices on a KeePass database to gain unauthorized access and fully compromise the system.

Bashed

Bashed

Exploiting a web server that's being used as a development environment by abusing artifacts left behind by the developer