root@sovietghost:~/blog#
ls -la posts/
TYPEDATEFILENAME
TYPDATEFILE
-rw-Oct 10Breaking the Sandbox: Memory Mapping & Seccomp Escape.md
# CTF writeup detailing a sandbox escape challenge: fixed RWX mmap, fork-before-seccomp, and non-interactive payloads to retrieve the flag.
-rw-Oct 10Shallow Query, Deep Trouble: MongoDB NoSQL Injection.md
# CTF writeup detailing a MongoDB NoSQL injection: discovery, exploitation, payloads, and mitigation notes.
-rw-Oct 02Chasing Shadows: Tracking Digital Intrusions.md
# Exploring the intersection of technical investigation, evidence gathering, and cyber situational awareness.
-rw-Sep 29CVE Viewer Added.md
# Introducing our new CVE Viewer feature – explore vulnerabilities in detail and stay informed.
-rw-Sep 24Two-Factor Isn't Bulletproof.md
# Why enabling 2FA is smart but not a silver bullet — common bypasses, realistic limits, and practical hardening advice for users and admins.
-rw-Sep 23What is SOC.md
# A deep, practical, no-nonsense guide to Security Operations Centers (SOC): what they do, how they work, the tech and people that run them, and how to build one that actually reduces risk.
-rw-Sep 01I added new forum feature.md
# Announcing the launch of our new forum feature - a place for community discussion and collaboration.
-rw-Sep 01Revisiting Vulns: Log4Shell – The Java Nightmare.md
# A deep dive into Log4Shell (CVE-2021-44228), the widespread Java logging vulnerability that shook the internet, and lessons for modern cybersecurity.
-rw-Aug 31Revisiting: Next.js Middleware Vulnerability (CVE-2025-29927).md
# Episode 1 of 'Revisiting' — a deep, defensive look at the critical Next.js middleware authorization-bypass (CVE-2025-29927): what went wrong, how it was abused, and how you can detect and harden your apps. Includes SIEM queries, WAF rules, CI tests, and an incident playbook.
-rw-Aug 31Julian Assange: The Story Behind WikiLeaks.md
# A comprehensive look at Julian Assange, founder of WikiLeaks, his controversies, and his impact on global transparency, cybersecurity, and whistleblowing.
-rw-Aug 31Edward Snowden: The Man Who Exposed the Shadows.md
# An in-depth look at Edward Snowden, his whistleblowing revelations, and the global impact on privacy, surveillance, and digital freedom.
-rw-Aug 31GeoHotz: The Most Notorious Hacker.md
# A deep dive into the life, exploits, and influence of George Hotz, better known as GeoHotz, one of the most infamous hackers in history.
-rw-Aug 31Top 10 Government Backdoors You’re Using Daily.md
# A humorous deep dive into the 'hidden government backdoors' in everyday objects you never suspected. Spoiler: your toaster may be watching you.
-rw-Aug 31Why the UK Digital Protection Act 2025 Fails: A Deep Critique.md
# A long-form, evidence-backed critique of the UK's Digital Protection Act (Online Safety + Data reforms). Examines encryption, age verification, free speech risks, burdens on civil society, and geopolitical fallout — with practical alternatives.
-rw-Aug 31The Importance of the 5th Amendment: Protecting Your Rights.md
# An exploration of the 5th Amendment, its role in protecting individual rights, and its relevance in modern legal and digital contexts.
-rw-Aug 31Cool Nmap Tricks: Advanced Network Scanning Techniques.md
# Exploring advanced Nmap features and tricks for network discovery, security auditing, and ethical hacking.
-rw-Aug 31Hacker Mindset vs Corporate Mindset.md
# A deep dive into the philosophical and practical differences between hacker thinking and corporate operational thinking in the digital era.
-rw-Aug 31Activism in the Digital Age: Mobilizing Change Online.md
# Exploring how digital tools and platforms empower modern activism, amplify voices, and reshape social movements.
-rw-Aug 31Psychology of Scams and Why People Fall for Them.md
# Exploring the psychological tactics used in scams, why people are susceptible, and how to recognize and avoid deception.
-rw-Aug 31The Fine Line Between Privacy and Security.md
# Exploring the delicate balance between personal privacy and organizational or national security in the digital era.
-rw-Aug 31Social Media Addiction: How Algorithms Control You.md
# An exploration of how social media platforms use algorithms to manipulate attention, influence behavior, and affect mental health.
-rw-Aug 31Deep Fakes: Understanding and Defending Against Digital Deception.md
# A comprehensive overview of deep fakes, their risks, and strategies to detect and mitigate threats posed by synthetic media.
-rw-Aug 31Cyber Laws: Navigating the Digital Legal Frontier.md
# An overview of cybersecurity laws, regulations, and digital rights that every hacker and cybersecurity enthusiast should understand.
-rw-Aug 31Advanced Persistent Threat (APT) Groups: Inside the Shadows.md
# An exploration of APT groups, their techniques, motivations, and the lessons ethical hackers can learn from these sophisticated cyber actors.
-rw-Aug 31Arch Linux: Mastering a Hacker's Playground.md
# An in-depth guide to Arch Linux for hackers, cybersecurity enthusiasts, and tech-savvy users seeking full control over their systems.
-rw-Aug 31Phishing Simulations for Awareness Training.md
# A guide to using phishing simulations to educate users on recognizing and responding to phishing attacks, enhancing organizational security awareness.
-rw-Aug 31Secure DevOps: CI/CD for Hackers.md
# An in-depth guide on implementing secure DevOps practices and CI/CD pipelines for ethical hackers and cybersecurity enthusiasts.
-rw-Aug 31VPN vs Tor vs Proxy: Choosing the Right Privacy Tool.md
# A comprehensive guide comparing VPNs, Tor, and proxy servers to help you choose the best privacy tool for your needs.
-rw-Aug 31Blue Team Security Tools Explained.md
# A comprehensive guide to essential blue team cybersecurity tools and their roles in protecting networks, endpoints, and applications.
-rw-Aug 31Wi-Fi Security and Aircrack-ng: Learning the Wireless Battlefield.md
# A hands-on guide to understanding Wi-Fi security, how Aircrack-ng works, and how to test wireless networks for educational purposes.
-rw-Aug 31SovietTech & Retro Computing: Ghosts of the Digital Past.md
# Explore the unique world of Soviet-era computers, their innovations, and their legacy in modern hacking and cybersecurity.
-rw-Aug 31Why Signal is the Ultimate Privacy-First Messaging App.md
# Discover why Signal outshines WhatsApp and Telegram with its uncompromising commitment to privacy, security, and user freedom.
-rw-Aug 31End-to-End Encryption: Securing Your Digital Life.md
# A deep dive into end-to-end encryption, how it works, why it matters, and practical ways to protect your communications.
-rw-Aug 31Digital Freedom Manifesto.md
# A manifesto on the importance of digital freedom, privacy, and maintaining autonomy in a surveillance-heavy world.
-rw-Aug 31Bun: A Complete Beginner's Guide.md
# Learn Bun, the high-performance JavaScript runtime. Quick setup, running scripts, web servers, and using npm modules faster than ever.
-rw-Aug 31OPSEC 101: Protecting Yourself in the Digital Shadows.md
# A practical guide to operational security (OPSEC) for hackers, researchers, and privacy-conscious netizens.
-rw-Aug 31Initial Blog Post.md
# Welcome to my cyberpunk-inspired blog! Explore code, tech, and digital creativity.
> Found 37 posts total