A blog about cyber security and software engineering, mainly focussed on adversary tactics and red team operations.
This blog is built by Tijme Gommers – Buy me a coffee via PayPal

Features

Development

The commands below are prefixed with ./dotenv to source the .env variables to your Environment variables. Thus, make sure to create your own .env file by copying .env.example and updating the variable values.

Install dependencies:

./dotenv bundle install

Serve the static website:

./dotenv bundle exec jekyll serve

Issues

Issues or new features can be reported via the issue tracker. Please make sure your issue or feature has not yet been reported by anyone else before submitting a new one.

Security

If you discover a security vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. Please report your security vulnerability to the lead maintainer via GitHub security advisories. We strive to resolve all problems as quickly as possible, and we would like to play an active role in the ultimate publication on the problem after it is resolved.

Privacy

We do not collect personally identifiable information in any way. Please refer to the privacy policy for information.

License

The source of this blog is copyrighted but available to anyone on the internet. You can use it in accordence of the license. View LICENSE.md for the full license.

jekyll logo

Want a Jekyll website built?

Hire a Jekyll developer