Professionally Evil Insights

Welcome to the Professionally Evil Insights blog by Secure Ideas! In this digital playground, we unravel the complex world of information security with a touch of fun. Our expert-led content ranges from deep-dives into penetration testing to explorations of hardware hacking. Whether you're curious about Secure Ideas or passionate about cybersecurity, this blog is your quick, enlightening, and entertaining guide into the captivating world of information security.

Welcome aboard!

    How to configure BurpelFish
    I recently was doing a pentest and was continuously looking up translations for words, and thought ...
    Continue Reading
    Linux X86 Assembly - How To Make Payload Extraction Easier
    Overview In the last blog post of the X86 Linux assembly series, we focused on how to make our ...
    Continue Reading
    A New Consultant’s 1st Con - Wild West Hackin Fest - Way West 2021
    Last month, I found myself Googling: Is weed legal in Nevada? This was the day after arriving in ...
    Continue Reading
    Linux X86 Assembly - How to Make Our Hello World Usable as an Exploit Payload
    Overview In the last two tutorials, we built a Hello World program in NASM and GAS for x86 ...
    Continue Reading
    The Best Way to Capture Traffic in 2021
    There are times when you need to capture some network traffic. Maybe you’re troubleshooting a ...
    Continue Reading
    Run as Admin: Executive Order on Cybersecurity
    On May 12, 2021, President Biden issued an executive order on cybersecurity. This new order ...
    Continue Reading
    Linux X86 Assembly - How to Build a Hello World Program in GAS
    Overview In the last tutorial, we covered how to build a 32-bit x86 Hello World program in NASM. ...
    Continue Reading
    Linux X86 Assembly - How to Build a Hello World Program in NASM
    Overview A processor understands bytecode instructions specific to that architecture. We as humans ...
    Continue Reading
    AppSec Cheat Code: Shift Left, Shift Right, Up, Down & Start
    Seamless and unobtrusive security is the future. We are huge advocates of shifting left and moving ...
    Continue Reading
    A Hacker’s Tour of the X86 CPU Architecture
    Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, ...
    Continue Reading
    Three Excellent API Security Practices Most People Neglect
    We are very much in the age of APIs. From widely-used single-purpose products like Slack to ...
    Continue Reading

    Never miss a professionally evil update!