Twelve Tables
  • Why 'Twelve Tables?'
  • WYSK
  • Tags
  • Search
Subscribe
Tagged

Hacking

Hacking and information security

Taking notes with Obsidian
How-to

Taking notes with Obsidian

Obsidian is a powerful note-taking application, but with a bit of a learning curve. This post provides a brief overview and detailed setup instructions.

Jackson Aug 17, 2022 • 18 min read
Hacking/Infosec Resources
Hacking

Hacking/Infosec Resources

Hacking resources: links, tutorials, courses, and books on security. This post will continue to be updated with new resources.

Jackson Oct 4, 2021 • 2 min read
Regulation and Ransomware: Fix the *Right* Problem
Cybersecurity

Regulation and Ransomware: Fix the *Right* Problem

Any ransomware solutions dictated to industry that fail to primarily address the business side will be ineffective at best, and are most likely to be costly, ineffective, and burn political capital with industry and voters.

Jackson Jun 24, 2021 • 7 min read
Wrapper Development for Mythic C2
Hacking

Wrapper Development for Mythic C2

This how-to walks through building a generic C# wrapper for Mythic C2 version 2.1

Jackson Dec 4, 2020 • 14 min read
Twelve Tables © 2023
  • Privacy Policy
Powered by Ghost