Automated CLI proxy intercepts November 21, 2020 in infosec | Tags: #information-security , #mitmproxy , #pentesting Learn how to set up mitmproxy using Docker to intercept, inspect, and manipulate HTTP requests from browsers and command-line tools.
Structured SSH key management: beyond basic organisation November 16, 2020 in infosec | Tags: #ssh , #security , #linux , #productivity , #devops , #information-security Learn how to implement a robust organisation system for your SSH keys with practical directory structures, naming conventions, and automation techniques.