profile picture

Lee Holmes

Precision Computing - Software Design and Development

© Lee Holmes 2024
  • Home
  • Projects
  • Archive
  • Writing
  • About
    2024
      Security Risks of Postman
      Jan 29
    2021
      Data Exfiltration via Mouse Wiggles
      May 4
      BinShred - Parsing Arbitrary Binary Data in PowerShell
      Apr 6
      Using Bloom Filters to Efficient Filter Out "Known Good"
      Mar 24
    2020
      List of InfoSec Cognitive Biases
      Apr 15
      Client IP Address Disclosure in various consumer mail servers
      Apr 2
    2019
      Searching for Content in XOR "Encrypted" Data
      Dec 10
      WebSockets from Scratch
      Aug 13
      Efficiently Generating Python Hash Collisions
      Jul 23
      Extracting Forensic Script Content from PowerShell Process Dumps
      Jan 17
      Extracting Activity History from PowerShell Process Dumps
      Jan 4
    2018
      Creating a Good Security Conference CFP Submission
      Jul 16
      XOR is Not as Fancy as Malware Authors Think
      Apr 9
    2017
      Searching for Content in Base-64 Strings
      Sep 21
      Adding a Let's Encrypt Certificate to an Azure-Hosted Website
      Mar 21
      Detecting and Preventing PowerShell Downgrade Attacks
      Mar 17
    2016
      More Detecting Obfuscated PowerShell
      Oct 22
    2015
      Detecting Obfuscated PowerShell
      Nov 13
    2014
      Maslow's Hierarchy of Security Controls
      Dec 9
      Fixing KeePass' Slow Startup Performance
      Apr 4
    2013
      More Packet Hacking with PowerShell - UDP Manipulation
      Aug 16
      Redacting Sensitive Information with PowerShell
      Aug 12
    2011
      Breaking Hash Codes - Part I
      Nov 7
      An Introduction to Hashing and Hash Codes
      Feb 7
    2010
      Adjusting Token Privileges in PowerShell
      Sep 24
    2009
      PowerShell Cryptography Library
      Oct 19
      Auto-Updating With No Reboot
      Jul 11
      PowerShell Script Encrypter
      Feb 2
      Scripting WinDbg with PowerShell
      Jan 21
    2008
      PowerShell Execution Policies in Standard Images
      Jul 24
    2007
      Removing Certificates from the Certificate Store
      Aug 23
      Secret SQL Escape Characters
      Jul 20
      Discovering Registry Settings - PowerShell and Process Monitor
      May 5
    2006
      SecureStrings and Plain Text in PowerShell
      Sep 7
      SecureStrings in PowerShell
      Jun 1
      Breaking Open the dir-LIVE Script
      Apr 20
      Introduction to Cryptography
      Feb 28
    2005
      Cracking Safes With Thermal Imaging
      Nov 24
      Cracking Software to Run as Non-Admin
      Aug 26
      Demonstration of Monad's Security Features
      Aug 16
    2001
      GPG and Password / Internet Security
      Jan 31
    2000
      The Essential Unix / Linux Reference
      Sep 8