A wee writeup of an SQL injection vulnerability I had found within the open-source ChurchCRM CRM software. This vulnerability allows logged-in users to completely compsomise the database.
In this post, I’ll explain how Chromium’s Network Persistent State file can be utilised to recover SSIDs a suspect has previously been connected to.
In this post, I will look at the abundance of forensic artefacts which can be collected from Microsoft Teams Client on Windows Desktops.
In this post, I will look at the abundance of forensic artefacts which can be collected from Signal on Windows Desktops.
In this blog post, I will have a look at freely available APIs for searching flight tickets.
In this post, I will look at the abundance of forensic artefacts which can be collected from Viber on Windows Desktop.
In this post I will explain how I used a Nvidia Tesla T4 GPU rented from Google Cloud Platform to crack NTLM hashes using hashcat and John the Ripper at blazing speeds.
In this post I will present an API Documentation of the РЖД I had documented over at Postmans documenter and give an example how Python can be used to query data about Russian Railways.
An introduction to a set of LaTeX templates I had created as part of my graduate course at Abertay University.
For my personal side project travelhackingtool.com, which is an aviation database and API, containing thousands of airports, I was looking for an easy way and automated to create Hugo Posts for my airports based on the data of the API.