Unlocking Infinite Knowledge With ChatGPT
Explore how ChatGPT can serve as an AI assisted science based system to learn anything
Discover what agent skills are, why they're useful, and how you can set them up in your own projects. Get clear examples, learn the differences from other instruction methods, and see practical advice for using agent skills safely and effectively.
Read ArticleExplore how ChatGPT can serve as an AI assisted science based system to learn anything
Hosting doesn't have to be expensive. Check out how I host this blog site for a couple bucks a year using serverless technologies.
Feed your brain some sweet developer goodness from the comfort of your couch
Build an automated on-air indicator using LIFX smart lights and Microsoft Power Automate that changes colors based on your Outlook calendar to signal when you're available, in a meeting, or need focus time.
A starter guide to integreating security within your web application pipeline
The developer inner loop plays an important part in producitivity.
Building a comprehensive cloud-based monitoring system for solar generation and power consumption using Azure, PowerBI, and the SolarEdge API
Exploiting External Entity (XXE) Injection to get a shell, and abusing a developer's bad habits to escalate to root.
A cybersecurity challenge, demonstrating the exploitation of the Heartbleed vulnerability in OpenSSL and the Dirty COW vulnerability in Linux to exfiltrate sensitive information and gain root user privileges.
A step-by-step guide on exploiting a data validation vulnerability in an image upload plugin, demonstrating how to bypass content filters to execute malicious code and gain unauthorized access to a remote system.
A comprehensive guide on identifying and exploiting buffer overflow vulnerablities in third-party applications, using tools like nmap for system enumeration and vulnerability scanning.
A challenge that highlights the exploitation of broken access controls on a Jenkins installation and poor password practices on a KeePass database to gain unauthorized access and fully compromise the system.
Exploiting a web server that's being used as a development environment by abusing artifacts left behind by the developer
