🤷🏻‍♀️

Polyglot FizzBuzz in R (Plus: “Why Can’t Johnny Code?”)

| | C++, Javascript, python, R
I caught this post on the The Surprising Number Of Programmers Who Can’t Program from the Hacker News RSS feed. Said post links to another, classic post on the same subject and ...
Decrypting L0rdix RAT’s C2

Decrypting L0rdix RAT’s C2

In my previous blog post on L0rdix RAT, I took a look at its panel and builder components that have been circulating through underground forums recently. I identified a key as part ...
EH-Net Book Review - Linux Basics for Hackers

Book Review – Linux Basics for Hackers

With countless job openings and growth with no end in sight, InfoSec is the place to be. Many pose the question, “Where do I start?” Over his years of training hackers and ...
EH-Net - Daw - Ease Me Into Cryptography Part 3: Asymmetric Ciphers - Asymmetric Cyphers

Ease Me Into Cryptography Part 3: Asymmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how ...
Scapy-sploit: Python Network Tool is Vulnerable to Denial of Service (DoS) Attack CVE pending

Scapy-sploit: Python Network Tool is Vulnerable to Denial of Service (DoS) Attack CVE pending

We recently discovered that the latest version of Scapy, a powerful packet manipulation tool used by cybersecurity researchers and network engineers, is susceptible to a Denial of Service (DoS) vulnerability. Ironically, we ...
EH-Net - Bango - From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt - Arnold!

From Dev to InfoSec Part 4: Buffer Overflows Made My Brain Hurt

While I’ve written a lot of code in my time, I don’t think I’ve ever firmly appreciated how complex it can be to write secure code. We go about our lives taking ...
EH-Net - Daw - Ease Me Into Cryptography Part 2: Symmetric Ciphers - Symmetric Cyphers

Ease Me Into Cryptography Part 2: Symmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
In the first article in this series on the basics of crypto, "Ease Me Into Cryptography Part 1: Buzzwords and Hash Function", we learned some lingo and talked about the different aspects ...
EH-Net - Daw - Ease Me Into Cryptography Part 1 - 1 Bite at a Time

Ease Me Into Cryptography Part 1: Buzzwords and Hash Function

| | /root, Crypto, hash, highlight, python
You know what it’s like being in security, and someone asks you what you do. Now imagine the responses when I tell people I do cryptography. And it’s not just outsiders. Even ...
The World’s Most Popular Coding Language Happens to be Most Hackers’ Weapon of Choice

The World’s Most Popular Coding Language Happens to be Most Hackers’ Weapon of Choice

Python will soon be the world’s most prevalent coding language. That’s quite a statement, but if you look at its simplicity, flexibility and the relative ease with which folks pick it up, ...
✨

Digging into mbox details: A tale of tm & reticulate

| | python, R
✨ I had to processes a bunch of emails for a $DAYJOB task this week and my “default setting” is to use R for pretty much everything (this should come as no ...
Loading...