Lenam Blog
RSS FeedHello, welcome to Lenam's personal blog. Here you will find information about CTFs, hacking, programming, artificial intelligence, and technology in general.
I hope you find this information helpful, just as the information others selflessly shared on the internet was helpful to me at the time.
Important Notice
The content presented on this website is intended solely for educational purposes, learning, and practice in pentesting and capture the flag (CTF) competitions. I am not responsible for the misuse of the information shared here.
Read the blog posts or check About for more info.
Featured
WriteUp Shadow Blocks - Vulnyx
Published:Writeup of the Shadow Blocks machine (Vulnyx): iSCSI exploitation and disk data recovery to leak credentials, and unprotected NFS for privilege escalation.
Transformers.js: language models and ML in the browser
Published:Run AI models directly in the browser with Transformers.js and Hugging Face. Interactive chat demo with an LLM using WebGPU (GPU) or WASM (CPU), no server, free and 100 % private.
WriteUp Ipeuveseis - TheHackersLabs
Published:Writeup for the "Ipeuveseis" challenge from The Hackers Labs, focused on attacking IPv6 services, container hopping and privilege escalation. Perfect for practicing pentesting techniques in containerized IPv6 environments.
Recent Posts
How to limit AI access to your content without disappearing from the web (Part 3 - More token reduction)
Published:How to adapt alternative content to reduce tokens using TOON and other techniques.
How to limit AI access to your content without disappearing from the web (Part 2 - Technical strategies)
Published:Technical solutions to limit AI access to your web content.
How to limit AI access to your content without disappearing from the web (Part 1 - Introduction)
Published:An intermediate strategy to stay visible without giving away knowledge or increasing energy costs.