loading...
Ari Kalfus profile picture

Ari Kalfus

Penetration tester and devsecops engineer. @artis3n

Find The Cube

Find The Cube

Reactions 7 Comments 1
3 min read
How is Deno Doing? (Nov 2020)

How is Deno Doing? (Nov 2020)

Reactions 4 Comments 4
1 min read
Running a Graphical Application from a Docker Container - Simply and Securely

Running a Graphical Application from a Docker Container - Simply and Securely

Reactions 6
16 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Reactions 1
14 min read
Test a Million Supported Systems with Molecule + GitHub Actions Matrix

Test a Million Supported Systems with Molecule + GitHub Actions Matrix

Reactions 10
3 min read
True CI/CD Pipeline for "Golden Image" AMIs

True CI/CD Pipeline for "Golden Image" AMIs

Reactions 3
2 min read
Automatically Deploy Your Ansible Galaxy Collections

Automatically Deploy Your Ansible Galaxy Collections

Reactions 5
2 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

Reactions 14
14 min read
Writeup: HackTheBox Bank - NO Metasploit

Writeup: HackTheBox Bank - NO Metasploit

Reactions 0
8 min read
What is the difference between yarn and npm these days?

What is the difference between yarn and npm these days?

Reactions 38 Comments 19
1 min read
SSR apps - obfuscate your code?

SSR apps - obfuscate your code?

Reactions 3
1 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

Reactions 6
9 min read
Writeup: HackTheBox Grandpa and Granny - with Metasploit

Writeup: HackTheBox Grandpa and Granny - with Metasploit

Reactions 1
3 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

Reactions 5
3 min read
Writeup: HackTheBox Beep - with Metasploit

Writeup: HackTheBox Beep - with Metasploit

Reactions 1
8 min read
Hosting a Markdown Wiki For Pentests and Profit

Hosting a Markdown Wiki For Pentests and Profit

Reactions 6
17 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

Reactions 4
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

Reactions 4
4 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

Reactions 9
5 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

Reactions 7
1 min read
Why Quasar? Why Nuxt? Why Vue?

Why Quasar? Why Nuxt? Why Vue?

Reactions 9 Comments 6
1 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

Reactions 7
16 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

Reactions 6
7 min read
What API documentation generator/tool do you use?

What API documentation generator/tool do you use?

Reactions 81 Comments 39
2 min read
Galaxy Collections Part 3: Integration Tests with Molecule

Galaxy Collections Part 3: Integration Tests with Molecule

Reactions 6
4 min read
Galaxy Collections Part 2: Automatically Update Your Collection with Github Actions

Galaxy Collections Part 2: Automatically Update Your Collection with Github Actions

Reactions 6
16 min read
Galaxy Collections Part 1: Extending Ansible through Custom Plugins

Galaxy Collections Part 1: Extending Ansible through Custom Plugins

Reactions 6
16 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

Reactions 8
34 min read
Who's Using Isolates? (Cloudflare article)

Who's Using Isolates? (Cloudflare article)

Reactions 10 Comments 5
1 min read
Demystifying SOP and CSP, featuring CORS

Demystifying SOP and CSP, featuring CORS

Reactions 15
11 min read
How do you authenticate your users?

How do you authenticate your users?

Reactions 6 Comments 10
1 min read
Encrypting Files in a Post-PGP Age

Encrypting Files in a Post-PGP Age

Reactions 24 Comments 3
5 min read
Post-Quantum Cryptography, Part 2: Supersingular Isogenies

Post-Quantum Cryptography, Part 2: Supersingular Isogenies

Reactions 12
6 min read
Post-Quantum Cryptography, Part 1: Quantum Computing

Post-Quantum Cryptography, Part 1: Quantum Computing

Reactions 26 Comments 3
7 min read
Random vs. Pseudorandom

Random vs. Pseudorandom

Reactions 40 Comments 2
9 min read
loading...