Building RabbidCode: An AI Dev Workstation
I had an HP Z840 Workstation sitting around collecting dust and decided it was the perfect candidate to become a dedicated AI development machine. Debian 13, OhMyDebn, Claude Code, opencode, and VS Code — this is the full build log.
Read more →
The New Phish
Scams and phishing are continually getting more creative, and today I came across one phishing attack that really kinda amazed me. The attack uses a legitimate Microsoft login pag…
Read more →
Offensive Security AWAE
A few months ago registration for BlackHat USA19 kicked off, and for the third year in a row I just missed getting into Offensive Security’s Advanced Web Attacks and Exploitation (…
Read more →
Hacker0x01 50m_ctf
So I have never done write-ups for CtF's before but I am taking the information that I have and putting it all together in some posts. This post and CtF posts before this date are…
Read more →
KringleCon 2018
SANS puts on KringleCon and I have to say not only was it fun but some of it really made me think. I made it to the end of this one but yet once again … I am writing this way, way…
Read more →
Metasploit/Rapid7 CtF: 2018
This was the first CtF that I participated in that I actually kept files for. This was don back in late 2018 and here I am almost 4 months later trying to write about it ... yeah …
Read more →
Hacker 101: CtF Series
Hacker0x01 has a great CtF series that is just perfect for practicing. Although it would not be fair to release findings as there are h1 private invites being awarded for the comp…
Read more →
AWS S3: Misconfiguration, Discovery, and Abuse
Recent news of the Verizon data leak http://www.darkreading.com/cloud/verizon-suffers-cloud-data-leak-exposing-data-on-millions-of-customers/ and a similar scenario concerning Dow …
Read more →
HackRF: The easy way
RTL-SDR is a dirt cheap way to start playing with radio using the RTL2832U chipset. I like to do things right when I start a project so I decided to purchase a nice SDR hardware tr…
Read more →
Transfer Any Binary into a Protected Network
Well this is another old trick that still works today. It still gets past all edge security and antivirus … well that is until you pull the executable out again. I find myself us…
Read more →
Offensive Security PWB (OSCP) - A Review
Let’s start off on the right foot shall we? I don’t want to be rude but – I am a computer geek, my writing skills are not so great. So if you don’t like the way I write just quit…
Read more →
TransHex Server and Client
We have all faced the problem of transferring “malicious” or binary files through corporate firewalls or proxies when doing penetration tests. Previously the work around was quite…
Read more →
GFI LanGuard 2012 Priviledge Escalation
https://github.com/RabbidByte/GFI2012-PrivilegeEscalation
Read more →
Mobile Hacking
1. an Alix board, CF, and enclosure
2. two ALPHA USB Wireless cards
3. a cell phone that you can tether to
4. mobile power solution
Read more →