All Posts

  • Giving AI Access to the Terminal

    Giving AI Access to the Terminal

    With the rise of LLMs and other AI tools, it’s given that many people would use them for automating tasks. One major interest for this is code or command generation with LLMs and in this article, we’ll look at how effective LLMs are at completing a given task when given full access to the user’s…


  • Using Burp Suite to Analyze POST Data

    Using Burp Suite to Analyze POST Data

    Burp Suite is a set of advanced tools used to analyze websites. From scanners to fuzzers Burp has it all. In this article, we’ll review the proxy section of the suite. Let’s start by creating a new temporary project. And use the defaults. Click on Proxy on the top left. Open the browser. And enable…


  • FauxPilot vs Other Self Hosted AI Coding Assistants

    FauxPilot vs Other Self Hosted AI Coding Assistants

    A few months back I reviewed FauxPilot, a self hosted AI coding assistant that ran on docker. Overall it was an okay experience but it’s been some time and the AI llm scene has changed drastically. What’s Changed One of the biggest changes to llm’s is better quantizing methods. Quantizing allows models to be shrunk down…


  • Web Encryption Using Javascript

    Web Encryption Using Javascript

    I was analyzing a login page one day, and an odd idea came to me. What if we encrypt the data being sent on a website using Javascript? Admittedly, this idea seems pretty useless seeing that HTTPS does the same thing but better, but what about websites that use self-signed certificates or don’t use HTTPS…


  • Cloud Computers for Hacking

    Cloud Computers for Hacking

    Cloud computing has been around for a while now. There are offerings from many big tech companies and it’s very cheap, sometimes free, to get a cloud server up and running. In this article, we’ll look at the uses of these servers in the world of cybersecurity. Hosts But before we begin let’s review some…