Posts
All the articles I've posted.
-
WTF is SOC 2 Compliance?
Published: at 05:12 PMLet’s break down SOC 2 compliance like you're five — but with real-world examples, honest advice, and a no-BS approach to what this audit actually means for your product or startup.
-
PowerShell for Hackers: Exploitation Essentials
Published: at 10:00 AMA red teamer’s guide to PowerShell for post-exploitation: enum, privesc, persistence, and C2
-
The Ultimate Guide to the SOC: Cybersecurity's Nerve Center Explained
Updated: at 03:20 AMEverything you need to know about Security Operations Centers (SOCs) – why they exist, how they function, their tools, models, maturity, and implementation. A definitive resource.
-
Advanced Techniques for Bypassing Modern Web Application Firewalls
Updated: at 10:14 AMExplore advanced WAF bypass techniques including obfuscation, encoding, parameter pollution, and CDN flaws to evade modern detection systems and exploit critical web vulnerabilities.
-
Absurdism in Modern Life: Finding Meaning in the Meaningless
Updated: at 03:20 AMFeeling lost in the search for meaning? Exploring how to find your own 'point' even when the universe doesn't give easy answers, especially in our fast-paced modern world.
-
Hacking Your Brain: Can We Enhance Intelligence?
Updated: at 09:20 AMExploring various methods of 'brain hacking' from lifestyle changes and cognitive training to nootropics and technology, discussing their effectiveness, scientific backing, and ethical implications.
-
JSON Interoperability Vulnerabilities: A Deep Dive
Published: at 06:06 PMExploring JSON interoperability vulnerabilities, including duplicate keys, key collisions, serialization quirks, and floating-point representation errors.
-
Hacking AI: Exploiting OWASP Top 10 for LLMs
Published: at 03:10 AMA deep dive into the security vulnerabilities of LLMs as outlined in OWASP’s Top 10, with real-world attack scenarios, exploitation techniques, and mitigation strategies.
-
Cybersecurity Compliance in 2025
Updated: at 10:14 AMThe regulatory landscape surrounding cybersecurity is becoming increasingly complex and stringent.
-
The Philosophy of Time – Lessons from Seneca
Updated: at 10:14 AMExploring Seneca's philosophy on time, its fleeting nature, and how we can use it wisely in our modern lives.