About Jesse Shelley

I have many years of experience as a criminal investigator, evidence custodian, IT administrator, and as an information security specialist. I've performed dozens of digital forensic examinations on cases involving criminal matters such as murder, domestic terrorism, sexual assault, child exploitation, CSAM, CSEC, illegal wiretapping, bomb threats, kidnapping, military, corporate, and casework from alphabet agencies such as the FBI and DEA.
27 04, 2022

Python Socket Programming – Simple Bidirectional Communication

2022-04-27T01:22:40+00:00Wednesday, April 27, 2022|Categories: Code Snippets|Tags: , , |0 Comments

These two scripts (client and server) demonstrate a simple method to utilize the Python Sockets library for bi-directional communication.

1 03, 2022

Iterate Through Files and Generate File Hash (MD5 and SHA256) with Walrus Operator

2022-03-02T01:52:40+00:00Tuesday, March 1, 2022|Categories: Code Snippets, Digital Forensics|Tags: , , , , , |0 Comments

This code calculates either an MD5 and or SHA256 hash of a file and then returns one or more values.

26 01, 2022

A Vulnerability in pkexec Allows Privileged Program Execution (Privilege Escalation)

2022-01-26T20:12:32+00:00Wednesday, January 26, 2022|Categories: Cybersecurity News|Tags: , , , |0 Comments

Qualys security researchers have been able to independently verify the vulnerability, develop an exploit, and obtain full root privileges on default installations of Ubuntu, Debian, Fedora, and CentOS.

Go to Top