DEV Community

Ari Kalfus profile picture

Ari Kalfus

Penetration tester and devsecops engineer. @artis3n

Learn cyber security: TryHackMe Advent Of Cyber

Learn cyber security: TryHackMe Advent Of Cyber

22
Comments
1 min read

Want to connect with Ari Kalfus?

Create an account to connect with Ari Kalfus. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Find The Cube

Find The Cube

8
Comments
3 min read
How is Deno Doing? (Nov 2020)

How is Deno Doing? (Nov 2020)

4
Comments 4
1 min read
Running a Graphical Application from a Docker Container - Simply and Securely

Running a Graphical Application from a Docker Container - Simply and Securely

7
Comments
16 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

2
Comments
14 min read
Test a Million Supported Systems with Molecule + GitHub Actions Matrix

Test a Million Supported Systems with Molecule + GitHub Actions Matrix

10
Comments
3 min read
True CI/CD Pipeline for "Golden Image" AMIs

True CI/CD Pipeline for "Golden Image" AMIs

5
Comments
2 min read
Automatically Deploy Your Ansible Galaxy Collections

Automatically Deploy Your Ansible Galaxy Collections

5
Comments
2 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

15
Comments
14 min read
Writeup: HackTheBox Bank - NO Metasploit

Writeup: HackTheBox Bank - NO Metasploit

Comments
8 min read
What is the difference between yarn and npm these days?

What is the difference between yarn and npm these days?

38
Comments 19
1 min read
SSR apps - obfuscate your code?

SSR apps - obfuscate your code?

3
Comments
1 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

7
Comments
9 min read
Writeup: HackTheBox Grandpa and Granny - with Metasploit

Writeup: HackTheBox Grandpa and Granny - with Metasploit

1
Comments
3 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

5
Comments
3 min read
Writeup: HackTheBox Beep - with Metasploit

Writeup: HackTheBox Beep - with Metasploit

1
Comments
8 min read
Hosting a Markdown Wiki For Pentests and Profit

Hosting a Markdown Wiki For Pentests and Profit

7
Comments
17 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

5
Comments
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

4
Comments
4 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

10
Comments
5 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

8
Comments
1 min read
Why Quasar? Why Nuxt? Why Vue?

Why Quasar? Why Nuxt? Why Vue?

10
Comments 9
1 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

7
Comments
16 min read
How AWS's EC2 Instance Metadata V2 Prevents SSRF

How AWS's EC2 Instance Metadata V2 Prevents SSRF

8
Comments
7 min read
What API documentation generator/tool do you use?

What API documentation generator/tool do you use?

82
Comments 39
2 min read
Galaxy Collections Part 3: Integration Tests with Molecule

Galaxy Collections Part 3: Integration Tests with Molecule

6
Comments
4 min read
Galaxy Collections Part 2: Automatically Update Your Collection with Github Actions

Galaxy Collections Part 2: Automatically Update Your Collection with Github Actions

6
Comments
16 min read
Galaxy Collections Part 1: Extending Ansible through Custom Plugins

Galaxy Collections Part 1: Extending Ansible through Custom Plugins

8
Comments
16 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
Who's Using Isolates? (Cloudflare article)

Who's Using Isolates? (Cloudflare article)

10
Comments 5
1 min read
Demystifying SOP and CSP, featuring CORS

Demystifying SOP and CSP, featuring CORS

15
Comments 1
11 min read
How do you authenticate your users?

How do you authenticate your users?

6
Comments 10
1 min read
Encrypting Files in a Post-PGP Age

Encrypting Files in a Post-PGP Age

24
Comments 3
5 min read
Post-Quantum Cryptography, Part 2: Supersingular Isogenies

Post-Quantum Cryptography, Part 2: Supersingular Isogenies

12
Comments
6 min read
Post-Quantum Cryptography, Part 1: Quantum Computing

Post-Quantum Cryptography, Part 1: Quantum Computing

27
Comments 4
7 min read
Random vs. Pseudorandom

Random vs. Pseudorandom

41
Comments 2
9 min read
loading...