Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.

How to Create Custom Probes For NMAP Service/Version Detection
Overview NMAP is a fantastic tool for performing initial reconnaissance and enumeration. A simple ...
Learn more
How to verify PGP signatures
PGP (Pretty Good Privacy) is an encryption software that is mostly known for its use in email. It ...
Learn more

Low Hanging Fruit Ninja: Slashing the Risks of the Human Element
A long time ago in a galaxy far, far away, I was not a Security Consultant. I was a Chef. And I ...
Learn more

How to configure BurpelFish
I recently was doing a pentest and was continuously looking up translations for words, and thought ...
Learn more

Linux X86 Assembly - How To Make Payload Extraction Easier
Overview In the last blog post of the X86 Linux assembly series, we focused on how to make our ...
Learn more

A New Consultant’s 1st Con - Wild West Hackin Fest - Way West 2021
Last month, I found myself Googling: Is weed legal in Nevada? This was the day after arriving in ...
Learn more

The Best Way to Capture Traffic in 2021
There are times when you need to capture some network traffic. Maybe you’re troubleshooting a ...
Learn more

Run as Admin: Executive Order on Cybersecurity
On May 12, 2021, President Biden issued an executive order on cybersecurity. This new order ...
Learn more