Tomas' Labroratory

Archive

  1. When ping size matters
  2. Migrating ZFS backed VMs between Proxmox Clusters
  3. Sniffing Android x86 HTTPs traffic with BurpSuite
  4. Isolating Untrusted Devices at Switch Level
  5. Unlocking extra RAM in GSM Community Edition
  6. Fixing email display name spoofing
  7. Automating SMTP testing with nc
  8. SSL Sniffing with Android x86 and frida
  9. CLUG Presentation: AI for Beginners from a Beginner
  10. Using Frida to Bypass SSL Pinning on Android
  11. HTTPs Inspection of Android APK
  12. WAF Proxy with ModSecurity and Apache
  13. Convert Proxmox .raw to HyperV .vhdx
  14. Proxmox ATI GPU Passthrough Guide
  15. Reset Windows Passwords with chntpw
  16. OpenBSD BGP Router Benchmarking
  17. pingdiff: Bandwidth Estimation using ICMP
  18. Beyond ping: Detect packet drop within TCP session
  19. Howto Run Hyper-V 2016 Core without Domain Controller
  20. Veeam Endpoint Backup Free
  21. Solved: Outlook 2016 to Exchange 2010 setup
  22. Mount VMDK containing GPT partition on Linux
  23. Greedy Search Engines - All the same
  24. Troubleshooting vMotion "failed to resume" [Solved]
  25. Script for Verifying Authoritative Name Servers
  26. Zimbra ZeXtras JS Error [Solved]
  27. Base64 Paste version 0.2
  28. fio: Linux hard drive benchmark
  29. PHP URL include vulnerability detection and workaround
  30. Safe Ceph Utilization Calculator
  31. Rubber Stamp from a Big Name or Real Security?
  32. pfSense as transparent firewall
  33. View existing Ceph configuration at runtime
  34. Gb`'b4&^faQ? -> Beep It Over
  35. Let's encrypt is awesome
  36. Changing Ceph Configuration on all Nodes
  37. How to setup Ceph iSCSI target
  38. CUUG Presentation: Ceph - Software Defined Storage
  39. Slow VMWare performance iscsi tgt and ceph [Solved]
  40. Adventures with TeslaCrypt (AKA “VVV Virus”)
  41. Convert dynamic site to a static HTML site
  42. Uncloud Showcase: Dropbox alternative
  43. Base64 paste
  44. Account Registration phone verification internals
  45. MS SQL 1807 Error - Solved
  46. IT Security Secret Weapon: Physical Control
  47. Value of Personal Computing in the Cloud Era
  48. Undetectable Keylogger in 30 minutes
  49. ASP.NET dll download vulnerability
  50. Tcpdump HTTP headers
  51. Asterisk - Seamless dialing of remote extension through DTMF
  52. Asterisk - Seamless dialing of remote extension through DTMF
  53. Speed and Latency from Calgary to the Internet
  54. Am I a white hat or a black hat hacker?
  55. Improved proxmark3 scanning of ioProx / Kantech fobs
  56. Quick and easy iptables based proxy
  57. New Quantum Key Distribution Record by LANL
  58. [Solved] Linux PPTP client NATed behind pfsense firewall
  59. CAPTCHA firewall bypass / port knocking portal
  60. API Monitors
  61. IPv6 for the impatient
  62. Visualizing Complex Files
  63. Pingb: Bandwidth Measuring
  64. Growing Files Finder
  65. Dance Pad Walking Controller
  66. Presentation: High Availability through Virtualization
  67. Presentation: Asterisk PBX