Member-only storyLinux Security: Performing a Compliance Scan and Active Remediation Using OSCAPAustin Songer·Follow1 min read·Jul 16, 2020--ShareNo Audio
Austin SongerStudent Loan Forgiveness: Unraveling Biden’s Legal Maneuver Using the Higher Education Act for 2024…As a person that think college should be free. People need to realize….2 min read·Jun 30--
The InfoSec GuyBuilding a Secure Cybersecurity Research Lab: A Journey of Isolation and ExplorationIntroduction10 min read·Jun 3--
AL AnanyThe ChatGPT Hype Is Over — Now Watch How Google Will Kill ChatGPT.It never happens instantly. The business game is longer than you know.·6 min read·Sep 1--306
Inching Towards IntelligencePG Play — EvilBox-One | 89/100Hi! Today I’m working on EvilBox-One from Proving Grounds Play / VulnHub. This community rated intermediate box featured fuzzing for and…4 min read·Sep 19--
VengeanceEvil Twin Attack: Steal Wi-Fi PasswordCracking wifi password through a dictionary attack can only be successful if the password is listed in the wordlist that you are using…4 min read·Jul 5--
Samuel SteersHow to trace an IP address using OSINTThis article will briefly touch on using OSINT techniques to find information on IP addresses.4 min read·4 days ago--
Danny VargasSetting up VirtualBox Home Lab NetworkHaving a home lab network is necessary for any IT professional from Full Stack Developers to Cyber Security Engineers. Today, I will go…6 min read·Jul 20--