<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Code Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/category/code/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/category/code</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Thu, 12 Jan 2023 19:27:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.3</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>Code Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/category/code</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Webinar takeaway &#8211; Shellcode Execution with Python</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 12 Jan 2023 19:27:44 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[C2]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[shellcode]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=1038</guid>

					<description><![CDATA[<p>teaser for this Webcast, which made me attend Imagine you are pen testing a company and gain access to a Windows application server. You discover the server has application allow listing deployed, and strong EDR/XDR defensive solutions. To your excitement, you find there is a Python interpreter installed. It would be really great if you [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python">Webinar takeaway &#8211; Shellcode Execution with Python</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-python/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway &#8211;  Making MITRE ATT&#038;CK Actionable</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 19:11:06 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[att&ck]]></category>
		<category><![CDATA[mitre]]></category>
		<category><![CDATA[powershell]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=594</guid>

					<description><![CDATA[<p>My key takeaways ATT&#38;CK is a framework, not a how to or step by step instruction How do we protect ourselves from techniques like Powershell used for attacks? deep technical knowledge &#60;- hard to get for all 836 techniques mentioned in ATT&#38;CK Identify technique coverage Build (SIEM) detections &#60;- also hard to build PYATTCK and [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable">Webinar takeaway &#8211;  Making MITRE ATT&#038;CK Actionable</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-making-mitre-attck-actionable/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event takeaways: BSidesMeSh21 &#8211; day 2</title>
		<link>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-2</link>
					<comments>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-2#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 22 Jun 2021 16:05:01 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[botnet]]></category>
		<category><![CDATA[BSides]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[darknet]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[event]]></category>
		<category><![CDATA[logging]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=511</guid>

					<description><![CDATA[<p>My key takeaways 11 min from publishing credentials (accidently) to github till pwn 2019: ~200k credentials in Github ; 2021: +20% runtime secrets go to application secrets managers AWS Secrets Manager GCP Secrets Manager Hashicorp Vault Azure Vault InfoSec&#8217;s dirty little secret: We can&#8217;t know all the options, but we still need to help secure [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-2">Event takeaways: BSidesMeSh21 &#8211; day 2</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-2/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Event takeaways: BSidesMeSh21 &#8211; day 1</title>
		<link>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1</link>
					<comments>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 16:34:29 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[BSides]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[containers]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[edge computing]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[social engineering]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=507</guid>

					<description><![CDATA[<p>My key takeaways Security in sprints vs whole security sprints? Smaller activities from the very beginning. It is not full time, but always ongoing. And maybe, if the situation is very tricky, entire sprints might be necessary, too. &#8212; Thomas Fricke Kubernetes does its best to be secure inside. Unfortunatly it is not configured so [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1">Event takeaways: BSidesMeSh21 &#8211; day 1</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/event-takeaways-bsidesmesh21-day-1/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Workshop takeaways: Scaling Your Security Program with Semgrep</title>
		<link>https://jeanchristophvonoertzen.com/workshop-takeaways-scaling-your-security-program-with-semgrep</link>
					<comments>https://jeanchristophvonoertzen.com/workshop-takeaways-scaling-your-security-program-with-semgrep#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 18:16:49 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[code review]]></category>
		<category><![CDATA[devsec]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=486</guid>

					<description><![CDATA[<p>My key takeaways Detecting the lack of using secure defaults is much easier then finding bugs &#34;You can get amazing security wins if you can get a bit draconian about coding standards&#34; Blue teams can win, if they outmaneuver attackers in the OODA loop: 👀 🧠 👍 💪 generic checks can provide a lot of [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/workshop-takeaways-scaling-your-security-program-with-semgrep">Workshop takeaways: Scaling Your Security Program with Semgrep</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/workshop-takeaways-scaling-your-security-program-with-semgrep/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Shellcode Execution with GoLang</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 20 May 2021 18:11:39 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Golang]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[reverse shell]]></category>
		<category><![CDATA[shellcode]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=461</guid>

					<description><![CDATA[<p>My key takeaways Go basics: local functions start with small letter, exported functions start with a capital letter walrus operator = declare and initialize in one statement like k := 3 the only loop is a for loop Go is truly a compiled language, it produces a machine native executable Shellcode: machine code native to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang">Webinar Takeaway: Shellcode Execution with GoLang</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-shellcode-execution-with-golang/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar Takeaway: Uncovering Secrets and Simplifying Your Life with CyberChef</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-uncovering-secrets-and-simplifying-your-life-with-cyberchef</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-uncovering-secrets-and-simplifying-your-life-with-cyberchef#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 22 Apr 2021 18:08:25 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[hashing]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=433</guid>

					<description><![CDATA[<p>My key takeaways Secrets everywhere, even on a parachute landing a mars rover CyberChef is a GCHQ project, so be aware using it with client data There is even a receipe for OCR in CyberChef There is even a receipe for Creating QR-codes in CyberChef you can use it to extract all URLs eg from [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-uncovering-secrets-and-simplifying-your-life-with-cyberchef">Webinar Takeaway: Uncovering Secrets and Simplifying Your Life with CyberChef</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-uncovering-secrets-and-simplifying-your-life-with-cyberchef/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Releasing Your First (Python) Open Source Project to the Masse</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 13 Jan 2021 21:00:55 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[git]]></category>
		<category><![CDATA[webinar takeaway]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=352</guid>

					<description><![CDATA[<p>My key takeaways Version control is not for dev only. eg filename for docs 😉 Fear of Git is quite common great way of explaining git: staging: collect changes to track if you get it on the CLI it is much easier to understand it in any other tool remove the file due to pw-oopsie: [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse">Webinar takeaway: Releasing Your First (Python) Open Source Project to the Masse</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-releasing-your-first-python-open-source-project-to-the-masse/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Play a quiz while learning for a multiple choice test</title>
		<link>https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test</link>
					<comments>https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 06 Dec 2020 00:11:39 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[game]]></category>
		<category><![CDATA[learning]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[python]]></category>
		<category><![CDATA[quiz]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=234</guid>

					<description><![CDATA[<p>TL;DR Multichoice-quiz is a mulitple choice quiz game programmed in Python You can add your own quizzes as simple JSON files No GUI, just terminal OSISG should become a crowd-sourced quiz with the best information security questions out there short story long As I wrote in my post about the CompTIA Network+ certificate, using virtual [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test">Play a quiz while learning for a multiple choice test</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/play-a-quiz-while-learning-for-a-multiple-choice-test/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Webinar takeaway: Move Aside Script Kiddies: Malware Execution in the Age of Advanced Defenses</title>
		<link>https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses</link>
					<comments>https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 19:02:11 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[red team]]></category>
		<category><![CDATA[reverse shell]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?p=280</guid>

					<description><![CDATA[<p>My key takeaways it&#8217;s getting harder to execute malware in a lot of environments, also due to endpoint maturity 3 parts of an assumed compromise: priv esc, lateral movement, senstive data access Win10 is safer then ever, also Windows Defender has improved defense vendors have signatures for almost all metaspoilt machine code nowadays you can&#8217;t [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses">Webinar takeaway: Move Aside Script Kiddies: Malware Execution in the Age of Advanced Defenses</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/webinar-takeaway-move-aside-script-kiddies-malware-execution-in-the-age-of-advanced-defenses/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
