
THM Order
Decryption of an XOR cipher
Decryption of an XOR cipher
BadSuccessor attack for privilege escalation in Active Directory
GitHub Actions Workflow for Identity and Access Management
layout: post title: ‘CySky: Log Analysis’ date: 2025-05-08 09:54 -0700 description: CySky Notes Log Analysis image: path: ../assets/img/site_images/cysky/cs_0r2.png alt: CySky Log Analysis cate...
CySky Notes Forensics
CySky Notes Enumeration & Exploitation
Forensic investigation of disk image and network traces
GitHub Actions Automation to Monitor Labels in Repo
Digital forensics to recover deleted files