↓
Skip to main content
larsursprung.com
Home
~$whoami
CV
Projects
Blog
Contact
Photos
Home
~$whoami
CV
Projects
Blog
Contact
Photos
Blog
Building an MCP Server for AI-Powered Pentesting in Natural Language
13 April 2025
·
5 mins
Cyber Security
AI
Software Engineering
Python
Pentesting
Create an AI Agent to Automate Cyber Security News Reporting
14 February 2025
·
5 mins
Cyber Security
AI
Software Engineering
Python
Building a RAG System for Searching Through Cybersecurity News using AI
6 January 2025
·
3 mins
Cyber Security
AI
Software Engineering
Python
Crafting the Ultimate Pentest Note Template
18 July 2024
·
3 mins
Pentesting
Cyber Security
Offensive Security
Integrate External Threat Intelligence Data into OpenCTI
1 July 2024
·
3 mins
Cti
Threat Intelligence
Open Source
Create a Custom Wazuh Decoder and Block SMTP Brute-Force Attempts
15 March 2024
·
4 mins
Security
Siem
Xdr
Edr
Defensive Security
Automation
Creating a CI/CD Pipeline for Automated Website Deployment
11 February 2024
·
2 mins
Coding
Devops
Automation
CI/CD
Self-Hosted
Obtaining the root password of a Philips Hue Bridge
27 January 2024
·
3 mins
Penetration Testing
Iot
Hardware Hacking
Offensive Security
Evaluating the Security of a Budget Network Surveillance Camera
27 January 2024
·
8 mins
Penetration Testing
Iot
Hardware Hacking
Offensive Security
How to monitor gym utilization using Go and Prometheus
27 June 2023
·
3 mins
Coding
Tools
Golang
Log analysis for threat hunting and detection with Jupyter Notebooks and Python
5 March 2023
·
13 mins
Tools
Security
Python
Defensive Security
How to do code reviews for Java applications
25 January 2023
·
5 mins
Pentesting
Security
Creating an AI model for detecting ads with fast.ai and PyTorch
4 August 2022
·
2 mins
Coding
Machine Learning
AI
Python
Datascience
Does Bitcoin correlate with the stock market?
10 June 2022
·
2 mins
Coding
Machine Learning
AI
Python
Datascience
What's John the Ripper and how to use it?
4 March 2022
·
4 mins
Pentesting
Security
Tools
Offensive Security
1
2
→