- Caleb’s Guide to Getting Started in Attacking AI
- AI: A Check on the Hype and Hysterics
- Underwater ROV Project (Part 3)
- Integrating ChatGPT into Voice Prompts: Making Iron Man’s ‘JARVIS’
- ChatGPT, DAN, and Turning Up the Heat with Adversarial Machine Learning
- Getting Arbitrary Code Execution In a Python Script
- Shillbots.com: From Idea to Implementation
- An OSCP Retrospective
- A Quick CTF Methodology
- Underwater ROV Project (Part 2)
- Humanity in Times of Scarcity
- Underwater ROV Project (Part 1)
- But…Shouldn’t Security Be Our Number 1 Priority?
- A Study in Password Generation and Validation
- ShillBot: A Study in Identifying Reddit Trolls Through Machine Learning
- A Hacker’s View of Passwords
- A Study in IDN Homograph Attack Detection
- Growing Threats, Growing Attack Surface
- Software Development, Morality, ‘The Secret Life of Walter Mitty’, and Victor Frankenstein
- Dictionary Attacks on SSH and Web APIs
- The Value of a Secret
- Installing scikit-learn; Python Data Mining Library
- An Experiment on PasteBin
- Privacy: A How-To
- Git: List all branches, who made them, and when they were created
- Auto-generate HTML using a tree in Python
- Safety Assurance Cases: Making Compelling Arguments for Software Safety
- Photography is to the 21st Century as Painting is to the 17th Century
- Asteroid-Mining Company Launch Revitalizes Space Hopes