Basics of Cloud Computing & Security

Abstract In recent years, cloud computing has had a significant impact on technology that businesses are attempting to take full advantage of. This paper will discuss why cloud computing is so desirable by businesses and will also discuss the potential security risks that come with it. Once we understand cloud computing and how it works... Continue Reading →

Reversing Challenge: Snake HTB

To solve this quickly please look at the method stated at the bottom of the page. Firstly we download the zip from htb and unzip this to obtain the file we will be reversing ‘’. I will be completing this challenge using kali linux x64 but it should be very similar on any OS with... Continue Reading →

SMS/Text Spam Script

A friend of mine came to me in urgent need of annoying someone. This was an easy “yes” for me. Having the victims phone number we thought spamming the hell out of their phone would be interesting. I found many programs that would send texts via interface and or simple programs. What I could not... Continue Reading →

Programming From The Ground Up Chapter 4

Chapter 4 Know the Concepts 1) What are primitives? Primitives are the basics which everything else is built off of. These are operations provided by the system as you simply would not be able to write certain functions without primitives. 2) What are calling conventions? Calling conventions describe how functions expect to get and receive... Continue Reading →

Poison HackTheBox Notes

As I continue to post my notes for retired boxes you will likely notice a drastic increase in detail. A few boxes were completed when I was just getting into cyber security and since then I have learned a lot in regards to documentation. Simply based off of the name here we can determine this... Continue Reading →

Create a website or blog at

Up ↑