Lee Holmes
Precision Computing - Software Design and Development
Home
Projects
Archive
Writing
About
2024
Security Risks of Postman
Jan 29
2021
Data Exfiltration via Mouse Wiggles
May 4
BinShred - Parsing Arbitrary Binary Data in PowerShell
Apr 6
Using Bloom Filters to Efficient Filter Out "Known Good"
Mar 24
2020
List of InfoSec Cognitive Biases
Apr 15
Client IP Address Disclosure in various consumer mail servers
Apr 2
2019
Searching for Content in XOR "Encrypted" Data
Dec 10
WebSockets from Scratch
Aug 13
Efficiently Generating Python Hash Collisions
Jul 23
Extracting Forensic Script Content from PowerShell Process Dumps
Jan 17
Extracting Activity History from PowerShell Process Dumps
Jan 4
2018
Creating a Good Security Conference CFP Submission
Jul 16
XOR is Not as Fancy as Malware Authors Think
Apr 9
2017
Searching for Content in Base-64 Strings
Sep 21
Adding a Let's Encrypt Certificate to an Azure-Hosted Website
Mar 21
Detecting and Preventing PowerShell Downgrade Attacks
Mar 17
2016
More Detecting Obfuscated PowerShell
Oct 22
2015
Detecting Obfuscated PowerShell
Nov 13
2014
Maslow's Hierarchy of Security Controls
Dec 9
Fixing KeePass' Slow Startup Performance
Apr 4
2013
More Packet Hacking with PowerShell - UDP Manipulation
Aug 16
Redacting Sensitive Information with PowerShell
Aug 12
2011
Breaking Hash Codes - Part I
Nov 7
An Introduction to Hashing and Hash Codes
Feb 7
2010
Adjusting Token Privileges in PowerShell
Sep 24
2009
PowerShell Cryptography Library
Oct 19
Auto-Updating With No Reboot
Jul 11
PowerShell Script Encrypter
Feb 2
Scripting WinDbg with PowerShell
Jan 21
2008
PowerShell Execution Policies in Standard Images
Jul 24
2007
Removing Certificates from the Certificate Store
Aug 23
Secret SQL Escape Characters
Jul 20
Discovering Registry Settings - PowerShell and Process Monitor
May 5
2006
SecureStrings and Plain Text in PowerShell
Sep 7
SecureStrings in PowerShell
Jun 1
Breaking Open the dir-LIVE Script
Apr 20
Introduction to Cryptography
Feb 28
2005
Cracking Safes With Thermal Imaging
Nov 24
Cracking Software to Run as Non-Admin
Aug 26
Demonstration of Monad's Security Features
Aug 16
2001
GPG and Password / Internet Security
Jan 31
2000
The Essential Unix / Linux Reference
Sep 8