Lenam Blog
RSS FeedHello, welcome to Lenam's personal blog. Here you will find information about CTFs, hacking, programming, artificial intelligence, and technology in general.
I hope you find this information helpful, just as the information others selflessly shared on the internet was helpful to me at the time.
Important Notice
The content presented on this website is intended solely for educational purposes, learning, and practice in pentesting and capture the flag (CTF) competitions. I am not responsible for the misuse of the information shared here.
Read the blog posts or check About for more info.
Featured
How to limit AI access to your content without disappearing from the web (Part 1 - Introduction)
Published:An intermediate strategy to stay visible without giving away knowledge or increasing energy costs.
WriteUp Coliseum - Vulnyx
Published:Writeup of the Coliseum machine (Vulnyx): IDOR with Roman numerals, RCE via PostgreSQL, automation of decrypting a chain of password-protected zips using Caesar cipher and final privilege escalation with BusyBox.
MCP Server Creator: Turn Any Command into an AI Tool in 5 Minutes
Published:Interactive web tool for creating custom MCP (Model Context Protocol) servers. Allows generating MCP server code in Node.js and Python from existing binary or script configurations, including parameter management, security configuration, and input validation.
Recent Posts
How to limit AI access to your content without disappearing from the web (Part 3 - More token reduction)
Published:How to adapt alternative content to reduce tokens using TOON and other techniques.
How to limit AI access to your content without disappearing from the web (Part 2 - Technical strategies)
Published:Technical solutions to limit AI access to your web content.
In Defense of $ and # in the Shell Prompt
Published:Opinion piece on why keeping $ and # in the shell prompt still matters to quickly see whether you're a normal user or root, even in colorful terminals.