Twelve Tables
  • Why 'Twelve Tables?'
  • WYSK
  • Tags
  • Search
Sign in Subscribe

Hacking

Hacking and information security
Taking notes with Obsidian
How-to

Taking notes with Obsidian

Obsidian is a powerful note-taking application, but with a bit of a learning curve. This post provides a brief overview and detailed setup instructions.
Aug 17, 2022 18 min read
Hacking/Infosec Resources
Hacking

Hacking/Infosec Resources

Hacking resources: links, tutorials, courses, and books on security. This post will continue to be updated with new resources.
Oct 4, 2021 2 min read
Regulation and Ransomware: Fix the *Right* Problem
Cybersecurity

Regulation and Ransomware: Fix the *Right* Problem

Any ransomware solutions dictated to industry that fail to primarily address the business side will be ineffective at best, and are most likely to be costly, ineffective, and burn political capital with industry and voters.
Jun 24, 2021 7 min read
Wrapper Development for Mythic C2
Hacking

Wrapper Development for Mythic C2

This how-to walks through building a generic C# wrapper for Mythic C2 version 2.1
Dec 4, 2020 14 min read
Page 1 of 1
Twelve Tables © 2023
  • Privacy Policy
  • Community Guidelines
Powered by Ghost