GPT
2025-04-23
Generative Pre-trained Transformer (GPT) is a family of LLMs developed by OpenAI using transformer-based architecture, pre-trained on massive corpora ...
Read More
GREM
2025-04-23
The GIAC Reverse Engineering Malware (GREM) certification is a reverse engineering and malware analysis certification offered by SANS/GIAC. ...
Read More
habit
2025-04-23
A habit is a repeated behavior or routine performed with some regularity, often unconsciously.
Read More
habitual random card review
2025-04-23
A technique I use for serendipitous resurfacing in Zettelkasten-like systems is to make it a daily habit to review some cards at a set time. This time ...
Read More
hacking harness
2025-04-23
A hacking harness is a protective wrapper or control layer around offensive tooling that enforces OPSEC safeguards such as command filtering, output ...
Read More
hidden Markov model
2025-04-23
A Hidden Markov Model (HMM) is a statistical model representing systems with unobserved (hidden) states. HMM are commonly used in pattern recognition, ...
Read More
histogram
2025-04-23
A histogram is a graphical representation of the distribution of numerical data, often represented as bar graphs.
Read More
Hooking Nirvana
2025-04-23
Hooking Nirvana refers to concepts described by Alex Ionescu for stealthy, stable, and hard to detect hooking on Windows. ...
Read More
infrastructure hygeine
2025-04-23
Read More
infrastructure hygiene
2025-04-23
Infrastructure hygiene is an OPSEC practice of avoiding reusing linkable or poorly-configured infrastructure that could aid attribution or tracking.
Read More