Finding ways around digital roadblocks with DoH, hosts file, and SSH Socks Proxy
Alfa starts with enumeration on FTP to obtain a username and an image file which …
Tunneling with Chisel to deliver a buffer overflow exploit
Pentesting against simulated AWS S3 Bucket
Exploiting embedded system software