Professionally Evil Blog

A blog by experts of penetration testing and other security assessments.
    Coming Soon - Twelve Days of ZAPmas
    Coming Soon - Twelve Days of ZAPmas
    In December of 2018, I published a twelve-day series of cross-site scripting tips, tricks, and ...
    Learn more
    Nmap vs. Masscan
    Nmap vs. Masscan
    If you are in IT, chances are you have at least heard of Nmap and Masscan.  Both are free and ...
    Learn more
    Quick Bites Ep 4 - Let's Talk About SSRF, Baby!
    Quick Bites Ep 4 - Let's Talk About SSRF, Baby!
    Let’s talk about you and (application) secur-i-ty! Let’s talk about all the good things and the bad ...
    Learn more
    JuiceShop Workshop in less than 5 minutes
    JuiceShop Workshop in less than 5 minutes
    Have you ever deployed 10-30 containers in AWS with the single stroke of a key? (well if you don’t ...
    Learn more
    How to Obfuscate Strings in Rust the Easy Way Using the litcrypt Crate
    How to Obfuscate Strings in Rust the Easy Way Using the litcrypt Crate
    Overview Static strings in a binary can make the life easier for reverse engineers, be those ...
    Learn more
    (Not So) Quick Bites - Episode 3 - Writing About Writer's Block
    (Not So) Quick Bites - Episode 3 - Writing About Writer's Block
    So, sometimes I have a real problem with writing, specifically reports and blog posts.  Somehow, ...
    Learn more
    How to allow multiple RDP sessions
    How to allow multiple RDP sessions
      The goal of this article is to walk through how to set up a Windows host to allow multiple remote ...
    Learn more
    Hunting Secrets
    Hunting Secrets
    Applications are hemorrhaging sensitive data. In many cases, the culprit is marketing and analytics ...
    Learn more
    Ensuring Web Security via Ansible (Apache)
    Ensuring Web Security via Ansible (Apache)
    NOTE: even though this will require Ansible, you can run this on any operating system contrary to ...
    Learn more

    Never miss a professionally evil update!