Some time ago, I wrote the post Upload a package to PyPI, but, how everything evolves, this time I decided to evolve and take advantage of all the power of GitHub Actions. GitHub actions GitHub a...
What are dotfiles? Dotfiles are files where the programs store their configuration. Dotfiles are named that way because most of them starts with a dot “.”, although, nowadays, it’s common to use ...
Nowadays, git must be the most widely used source control. Although [almost] all IDEs implement it. Since git is very extensive, each IDE integrates its own set of actions. This means tha some acti...
Process argument spoofing (command line spoofing or program argument spoofing) is a technique that allow us to spawn a process with arguments and override those arguments at execution time. With th...
If you read my article Configuring Neovim as Python IDE, you already know that one of mi favorite editors is [neo]vim. Between other reasons, when I’m using [neo]vim I feel more focused, I don’t kn...
Headless info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.60 Target machine (victim, Headless): 10.10.1...
Description Garry told me to catch some fish 20 meters Solution To solve this challenge, I did a python script that you can see at: deepy_blue Fentastic Moves has been Pwned Enjoy! ;)
Perfection info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.108 Target machine (victim, Perfection): 10...
Machine info Bizness info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.79 Target machine (victim, Bizne...
Machine info Analytics info Annotations In this article we are going to assume the following ip addresses: Local machine (attacker, local host): 10.10.16.101 Target machine (victim, De...