Posts
All the articles I've posted.
-
BurpSuite Repeater/Intruder Power Tips
Advanced workflows, payload tricks, bypass techniques and hidden features for HTB, CTFs and real-world web exploitation
-
OSINT Capture-The-Flag Cheatsheet
Fast techniques, tools and workflows for social, metadata, geolocation, infrastructure and digital footprint CTF challenges
-
Vector Embeddings and Semantic Search: The Foundation of Modern AI
A comprehensive exploration of vector embeddings, from word2vec to modern transformers, and how they enable semantic search in production systems
-
Understanding LLM (Large Language Models): From Transformers to GPT
A deep dive into the architecture, mechanisms, and evolution of Large Language Models, from the Transformer breakthrough to modern GPT systems
-
Port Forwarding & Pivoting Cheatsheet
Quick notes for HTB, CTFs, tunneling, data exfiltration and exposing internal services
-
Password Attacks & Credential Hunting Cheatsheet
Bruteforce, credential harvesting, hash cracking, spraying and password reuse attacks for HTB, CTFs and real-world pentests
-
Reverse Shells & Web Shells Cheatsheet
Quick shells for HTB/CTFs: reverse shells, bind shells, web shells, upgrades and fallback techniques