Enabling nested Virtualisation on ProxMox VE and KVM.
Adding security monitoring to our CTF platform.
Adding vulnerabilities into our CTF environment using Ansible.
Setting up an infrastructure penetration testing CTF.
Running LLM’s on Ubuntu.
Configuring VXLan’s in Linux.
Walking an x64 call stack using UNWIND data structures.
Unlocking LUKS encrypted disks remotely.
Blocking outbound docker traffic using an IPTables firewall.
A guide to enabling PowerShell constrained mode.
Ensuring all network traffic is routed over an OpenVPN connection.
Configuring Software Restriction Policies (SRP) in Windows 10.