Login
Discover
Waves
Decks
Plus
Login
Signup
scipio
@scipio
69
Does it matter who's right, or who's left?
Followers
1914
Following
112
Resource Credits
Available
Used
Created
2017-10-24 09:41
RSS Feed
Subscribe
Posts
Blog
Posts
Comments
Communities
Wallet
scipio
StemSocial
2026-05-18 13:55
Learn Ethical Hacking (#31) - Privilege Escalation - Linux
Learn Ethical Hacking (#31) - Privilege Escalation - Linux What will I learn What privilege escalation is and why it is the single most critical post-exploitation step; SUID/SGID binaries -- finding and
$ 1.052
16
scipio
StemSocial
2026-05-18 06:48
Learn AI Series (#70) - Running Local Models
Learn AI Series (#70) - Running Local Models What will I learn You will learn why running models locally matters: privacy, cost, control, and offline capability; the local inference stack: Ollama, llama.cpp,
$ 1.103
31
scipio
StemSocial
2026-05-17 17:20
Learn Zig Series (#51) - HTTP Server: Accept Loop and Parsing
Learn Zig Series (#51) - HTTP Server: Accept Loop and Parsing Project E: HTTP Server from Scratch (1/4) What will I learn You will learn how to build a TCP accept loop tuned for HTTP: keep-alive and timeouts;
$ 2.222
414
2
scipio
StemSocial
2026-05-16 20:16
Learn Zig Series (#50) - Build a Shell: Job Control and Signals
Learn Zig Series (#50) - Build a Shell: Job Control and Signals Project D: Build Your Own Shell (4/4) What will I learn You will learn signal handling: installing signal handlers with sigaction so Ctrl+C
$ 0.901
31
scipio
StemSocial
2026-05-16 07:35
Learn AI Series (#69) - Fine-Tuning Language Models
Learn AI Series (#69) - Fine-Tuning Language Models What will I learn You will learn when fine-tuning beats prompting and when it doesn't; full fine-tuning vs parameter-efficient methods; LoRA: low-rank
$ 1.110
22
scipio
StemSocial
2026-05-15 19:28
Learn Zig Series (#49) - Build a Shell: Built-in Commands
Learn Zig Series (#49) - Build a Shell: Built-in Commands Project D: Build Your Own Shell (3/4) What will I learn You will learn built-in vs external commands: why cd can't be external; You will learn
$ 0.956
16
scipio
StemSocial
2026-05-15 13:48
Learn Ethical Hacking (#30) - Wireless Network Attacks - Breaking Wi-Fi
Learn Ethical Hacking (#30) - Wireless Network Attacks - Breaking Wi-Fi What will I learn Wi-Fi security protocols: WEP, WPA, WPA2, WPA3 -- what is broken and what is not; Monitor mode and wireless packet
$ 1.764
355
1
scipio
StemSocial
2026-05-15 08:50
Learn AI Series (#68) - Building AI Agents (Part 2) - Advanced Patterns
Learn AI Series (#68) - Building AI Agents (Part 2) - Advanced Patterns What will I learn You will learn multi-agent systems: specialized agents that collaborate on complex tasks; hierarchical agents:
$ 1.266
26
scipio
StemSocial
2026-05-14 17:14
Learn Zig Series (#48) - Build a Shell: Process Spawning
Learn Zig Series (#48) - Build a Shell: Process Spawning Project D: Build Your Own Shell (2/4) What will I learn You will learn how std.process.Child works for spawning external programs from Zig; You
$ 0.950
10
scipio
StemSocial
2026-05-14 12:56
Learn Ethical Hacking (#29) - Network Sniffing - Seeing Everything on the Wire
Learn Ethical Hacking (#29) - Network Sniffing - Seeing Everything on the Wire What will I learn Packet capture fundamentals with tcpdump and Wireshark; ARP spoofing: becoming the man-in-the-middle on
$ 0.966
28
scipio
StemSocial
2026-05-14 07:11
Learn AI Series (#67) - Building AI Agents (Part 1) - Foundations
Learn AI Series (#67) - Building AI Agents (Part 1) - Foundations What will I learn You will learn what "agents" actually means beyond the marketing hype; the agent loop: observe, think, act,
$ 1.000
22
scipio
StemSocial
2026-05-13 16:35
Learn Zig Series (#47) - Build a Shell: Parsing Commands
Learn Zig Series (#47) - Build a Shell: Parsing Commands Project D: Build Your Own Shell (1/4) What will I learn You will learn tokenizing a command line: splitting on spaces, handling quoted strings and
$ 1.269
14
1
scipio
StemSocial
2026-05-13 12:24
Learn Ethical Hacking (#28) - The AI Web Attack Surface - AI Features as Vulnerabilities
Learn Ethical Hacking (#28) - The AI Web Attack Surface - AI Features as Vulnerabilities What will I learn Prompt injection: the new SQL injection for AI-powered applications; Indirect prompt injection:
$ 1.348
349
1
scipio
StemSocial
2026-05-13 07:13
Learn AI Series (#66) - Working with LLM APIs
Learn AI Series (#66) - Working with LLM APIs What will I learn You will learn the LLM provider landscape: OpenAI, Anthropic, Google, and open-source alternatives; the chat completions API: messages, roles,
$ 1.128
18
scipio
StemSocial
2026-05-12 19:16
Learn Zig Series (#46) - Image Tool: CLI Pipeline
Learn Zig Series (#46) - Image Tool: CLI Pipeline Project C: Image Manipulation Tool (3/3) What will I learn You will learn building a CLI that chains operations: img-tool input.ppm --grayscale --blur
$ 1.079
16
scipio
StemSocial
2026-05-12 12:31
Learn Ethical Hacking (#27) - Bug Bounty Hunting - Getting Paid to Hack the Web
Learn Ethical Hacking (#27) - Bug Bounty Hunting - Getting Paid to Hack the Web What will I learn How bug bounty programs work and where to find them; HackerOne, Bugcrowd, and direct programs -- choosing
$ 1.333
28
1
scipio
StemSocial
2026-05-12 07:56
Learn AI Series (#65) - RAG - Advanced Techniques
Learn AI Series (#65) - RAG - Advanced Techniques What will I learn You will learn hybrid search -- combining dense vector search with sparse keyword matching for better retrieval; re-ranking with
$ 0.646
25
scipio
StemSocial
2026-05-11 18:24
Learn Zig Series (#45) - Image Tool: Pixel Operations
Learn Zig Series (#45) - Image Tool: Pixel Operations Project C: Image Manipulation Tool (2/3) What will I learn You will learn grayscale conversion using the weighted luminance formula (0.299R + 0.587G
$ 1.424
16
scipio
StemSocial
2026-05-11 13:22
Learn Ethical Hacking (#26) - The Full Web Pentest - Methodology and Reporting
Learn Ethical Hacking (#26) - The Full Web Pentest - Methodology and Reporting What will I learn The complete web application pentest methodology: scoping, testing, reporting; How to chain vulnerabilities
$ 2.219
432
1
scipio
StemSocial
2026-05-11 07:00
Learn AI Series (#64) - Retrieval-Augmented Generation (RAG) - Basics
Learn AI Series (#64) - Retrieval-Augmented Generation (RAG) - Basics What will I learn You will learn why LLMs hallucinate and how RAG addresses the problem; the RAG pipeline: query, retrieve, generate;
$ 0.910
20