A blog about cyber security and software engineering, mainly focussed on adversary tactics and red team operations.
This blog is built by Tijme Gommers – Buy me a coffee via PayPal
The commands below are prefixed with ./dotenv
to source the .env
variables to your Environment variables. Thus, make sure to create your own .env
file by copying .env.example
and updating the variable values.
Install dependencies:
./dotenv bundle install
Serve the static website:
./dotenv bundle exec jekyll serve
Issues or new features can be reported via the issue tracker. Please make sure your issue or feature has not yet been reported by anyone else before submitting a new one.
If you discover a security vulnerability, we would like to know about it so we can take steps to address it as quickly as possible. Please report your security vulnerability to the lead maintainer via GitHub security advisories. We strive to resolve all problems as quickly as possible, and we would like to play an active role in the ultimate publication on the problem after it is resolved.
We do not collect personally identifiable information in any way. Please refer to the privacy policy for information.
The source of this blog is copyrighted but available to anyone on the internet. You can use it in accordence of the license. View LICENSE.md for the full license.