Walking an x64 call stack using UNWIND data structures.
Category: Security Engineering
Kali Linux – Ensuring Traffic is Only Sent via OpenVPN
A guide on configuring Kali so all network traffic is routed over an OpenVPN connection.
Windows 10 Software Restriction Policies
Configuring Software Restriction Policies (SRP) in Windows 10.
Active Directory Honey Tokens
Configuring Active Directory honey tokens to detect account enumeration.
Creating a WPA2 Enterprise Access Point Using Linux
A guide to configure a Linux system as a WPA2 Enterprise wireless access point using an Alpha wireless adapter.