by TCMS Staff | Mar 26, 2025 | Exploit Development, Programming
Buffer Overflows in 2025? Buffer overflows are one of the oldest computer vulnerabilities, stemming all the way back to the invention of the C programming language in the 1970s. Despite the fact that they are well-known and have been exploited for over 40 years, they...
by TCMS Staff | Feb 26, 2025 | Learning, Programming
One of the best ways to learn programming is to conceptualize and execute small, simple projects to hone your coding skills. To get the most out of your time and set yourself up for the greatest success, this blog post will explore some tips and suggest a few project...
by Alex Tushinsky | Jan 22, 2025 | Learning, Programming
Due to its simplicity and enormous library, Python has long been the go-to language of the hacking community, but learning C# can make you a more versatile and in-demand ethical hacker. I’m not suggesting that you abandon Python in favor of C#, but instead use C# on...
by TCMS Staff | Jan 8, 2025 | Programming
In this blog post, I’ll guide you through a project to start learning assembly, showing you all the steps and breaking the code down into manageable sections. For the project, we’ll code a number guessing game for a retro processor using an emulator that makes...
by TCMS Staff | Oct 9, 2024 | Programming, SOC
In our roles as cybersecurity professionals, we often find ourselves drowning in a sea of data logs, unable to extract meaning and insight from the enormous amount of data. This is where the great trio of sed, awk, and grep can be put into action. In spite of the fact...
by TCMS Staff | Sep 6, 2024 | Programming
In the realm of cybersecurity, scripting languages play a crucial role in automating tasks, managing systems, and responding to security incidents. Among the most popular scripting languages are Bash and PowerShell, each offering unique features and advantages for...