
Using n8n to Help Solve CTF problems
The first thing we need to do is get n8n locally installed and running. I chose to locally-host n8n for several reasons: It’s free and - as someone who has never used n8n before - I was leery a...

The first thing we need to do is get n8n locally installed and running. I chose to locally-host n8n for several reasons: It’s free and - as someone who has never used n8n before - I was leery a...

In my ongoing series of posts looking into AI’s applications to cybersecurity, this ones going to talk about Agentic AI. What are AI Agents? Most people familiar with large language models (LLMs)...

In this post, we’re going to configure an environment that will support a locally-hosted LLM to aid in reverse engineering and binaries. For this, we’ll be using: Virtualbox Ollama with a cor...

Starting Point I’ve been interested in pursuing Anti-Cheat (AC) as a research area and - to that end - I’ve been wanting to setup a virtualized environment to facilitate my R&D efforts. Howeve...

Starting Point I’ve recently become really interested in anti-cheat within video games. As someone who both works in and teaches cybersecurity, it strikes me as bearing a lot of similarities with ...

Starting Point At one point or another, most people looking to carve out a career in cybersecurity look to figure out whether or not they need to go to university for a degree (and if so, what kin...

Prologue These are my writeups of a few of the reverse engineering problems I tackled during this year’s HacktheBox Cyber Apocalypse 2025 CTF. Unfortunately, I could only allocate a few hours in t...

This ended up being a good introductory exercise to injecting shellcode. Rated “Very Easy” by Hack The Box, this pwn binary, this challenge took only a few minutes to exploit having got back into t...
If you’re interested in working in cybersecurity, you’ve probably seen at some point or another the plethora of articles, blogs, videos, etc. suggesting that there is a growing gap in the cybersecu...

HTB - Space Pirate: Going Deeper This was a pretty standard buffer overflow exercise. Rated “Very Easy” by Hack The Box, this pwn binary was a pretty cut-and-dry exercise (with the only real point...