• About admin

    Existing Vulnerabilities > 0days

    by  • February 16, 2013 • Uncategorized

    Earlier today I accidently opened up Twitter and saw this tweet: Some may disagree with the statement, but looking at targeted files on a daily basis, I would say it's pretty accurate. Truth be told, it only takes one person to open up the infecte...

    Read more →

    29C3 Post Thoughts

    by  • January 1, 2013 • Uncategorized

    For whatever reason, maybe it's the "chaos" in the name, I have always wanted to attend the Chaos Communications Congress in Germany. When I heard of the chance of attending this year, I jumped at it and was fortunate enough to earn a stamp of app...

    Read more →

    RSS Keyword Summaries Using Bookworm

    by  • November 25, 2012 • Uncategorized

    A few weeks ago I needed a way of grabbing a bunch of different articles based on a set of basic keywords for one of my projects. Essentially what I wanted was a way to feed a whole bunch of different RSS feeds into a program, have it download the...

    Read more →

    Can’t Automate? Bookmarklet it!

    by  • October 31, 2012 • Uncategorized

    I am doing my best at keeping the blog alive and have some projects I will be pushing out in the next week or so, but until then, I thought I would share this quick hack of a script I put together. If you don't automate in the field of security re...

    Read more →

    Flying Through TOR with Jetplane

    by  • September 30, 2012 • Uncategorized

    When researching targeted malware and its infrastructure, I often find myself writing trackers to poll or look for changes, so I get updated with little delay. For one particular instance I needed to hit a couple systems a few times a day and want...

    Read more →