Keyboard Shortcuts:
g + h: Home
g + b: Blog
g + c: Cheat Sheets
g + t: MacOS Tips
g + a: About
j / k: Up/Down
h / l: Next/Previous
?: Help
g + h: Home
g + b: Blog
g + c: Cheat Sheets
g + t: MacOS Tips
g + a: About
j / k: Up/Down
h / l: Next/Previous
?: Help
Keyboard Shortcuts
g + h : | Home |
g + b : | Blog |
g + c : | Cheat Sheets |
g + t : | MacOS Tips |
g + a : | About |
j / k : | Up/Down |
h / l : | Next/Previous |
? : | Help |
<Esc> : | Close |
Posts
- 18 Nov 2023 » Neat privilege escalation tricks
- 07 Nov 2023 » [CTF] Flux Capacitor (ELF 64-bit ASLR, NX bypass)
- 05 Nov 2023 » [CTF] Unauthorised Access (ELF 64-bit Format string vulnerability)
- 25 Oct 2023 » [CTF] Untraceable (PTRACE_TRACEME anti-anti-debug)
- 23 Oct 2023 » [CTF] Uncoding (XOR One-time pad)
- 21 Oct 2023 » [CTF] Three Keys (AES decryption)
- 19 Oct 2023 » [CTF] Erasure (XOR decryption)
- 17 Oct 2023 » [CTF] Repeated Maleficence (XOR known plaintext)
- 15 Oct 2023 » [CTF] PSA Games (RSA PKCS#7 insecure padding)
- 13 Oct 2023 » [CTF] Me is Mey (Custom SHA256 bypass)
- 11 Oct 2023 » [CTF] TDMR (ELF 64-bit Format string arbitrary write)
- 09 Oct 2023 » [CTF] RPZ Gate (ELF 64-bit Buffer overflow)
- 03 Oct 2023 » [CTF] Formula (ELF 64-bit Buffer overflow + Logical bug)
- 01 Oct 2023 » [CTF] Shell Shop (ELF 64-bit Buffer overflow)
- 03 Nov 2022 » Solving a Wooden Cube Puzzle
- 14 Mar 2020 » Advanced Web Attacks And Exploitation - Course and OSWE Exam Review
- 03 Jun 2019 » flAWS - Part 2 - Defender
- 01 Jun 2019 » flAWS - Part 2 - Attacker
- 01 May 2019 » flAWS - Part 1
- 01 Jun 2018 » (Retro) Hunting
- 27 May 2018 » post_url for Collections in Jekyll
- 18 May 2018 » [CTF] Under the Wire 5 - Trebek
- 16 May 2018 » [CTF] Under the Wire 4 - Oracle
- 14 May 2018 » [CTF] Under the Wire 3 - Groot
- 12 May 2018 » [CTF] Under the Wire 2 - Cyborg
- 10 May 2018 » [CTF] Under the Wire 1 - Century
- 15 Feb 2018 » How (Not) To Encrypt Google Docs
- 10 Feb 2018 » [CTF] BoE 2 - "Go with the (net)flow"
- 10 Feb 2018 » [CTF] BoE 1 - "I smell a rat"
- 01 Dec 2017 » Building A Humidity Temperature Rig With Arduino
- 17 Sep 2017 » Hacking GNOME Minesweeper
- 10 Sep 2017 » Serene Binary Analysis with Angr
- 01 Sep 2017 » Investigating A Hardware Keylogger
- 23 Aug 2017 » Exploring Procdot
- 16 Aug 2017 » Progressing In Infosec
- 09 Aug 2017 » Exploring Prefetch Part 2
- 02 Aug 2017 » Use Bluetooth Device For Better Security
- 25 Jul 2017 » Token-based Authentication for SSH
- 17 Jul 2017 » Using Tokens in Ubuntu with PGP
- 09 Jul 2017 » KeePass Password Manager With 2FA
- 02 Jul 2017 » Physical OPSEC Basics
- 29 Jun 2017 » Exploring Prefetch Part 1
- 25 Jun 2017 » The Technical Interview part 2
- 10 Jun 2017 » The Technical Interview part 1
- 01 Jun 2017 » [CTF] Why So Fancy?
- 13 May 2017 » Breaking Neural Networks
- 06 May 2017 » Preventing Evil Maid Attacks
- 05 May 2017 » [CTF] Sectalks London - 08
- 27 Feb 2017 » Dawkins' Weasel
- 25 Feb 2017 » Control Website With Keyboard Shortcuts
- 04 Feb 2017 » [CTF] Sectalks London - 05
- 08 Aug 2016 » [CTF] Sectalks London - 04
- 01 Aug 2016 » [CTF] Quantum Malware
- 17 Mar 2016 » [CTF] Binary Master Lieutenant - 5
- 10 Mar 2016 » [CTF] Binary Master Lieutenant - 4
- 02 Mar 2016 » [CTF] Binary Master Lieutenant - 3
- 23 Feb 2016 » [CTF] Binary Master Lieutenant - 2
- 16 Feb 2016 » [CTF] Binary Master Lieutenant - 1
- 09 Feb 2016 » [CTF] Binary Master Ensign - 5
- 28 Jan 2016 » [CTF] Binary Master Ensign - 4
- 21 Jan 2016 » [CTF] Binary Master Ensign - 3
- 14 Jan 2016 » [CTF] Binary Master Ensign - 2
- 07 Jan 2016 » [CTF] Binary Master Ensign - 1
- 02 Mar 2014 » Cracking the Perimeter - Course and OSCE Exam Review
- 17 Jan 2014 » LSB Steganography with Python
- 01 Nov 2013 » Hidden Command Listener
- 13 Sep 2013 » [SLAE ?] Bind TCP Shellcode with Password
- 05 Sep 2013 » [SLAE 7] AES Shellcode crypter
- 01 Sep 2013 » [SLAE 6] Polymorphic Shellcodes
- 25 Aug 2013 » [SLAE 5] Metasploit meterpreter/reverse_tcp Shellcode
- 17 Aug 2013 » [SLAE 5] Metasploit Shell Find Port
- 11 Aug 2013 » [SLAE 5] Metasploit Shellcode Analysis
- 07 Aug 2013 » Store Encrypted Files on Google Drive
- 05 Aug 2013 » [CTF] Coursera Malicious Software Challenge
- 04 Aug 2013 » [SLAE 4] Custom Encoding Scheme
- 25 Jul 2013 » [SLAE 3] Egghunter Shellcode
- 18 Jul 2013 » [SLAE 2] Reverse TCP Shellcode
- 10 Jul 2013 » [SLAE 1] Bind TCP Shellcode
- 01 Apr 2013 » Fair Result With Biased Coin
- 02 Mar 2013 » Dictionary Attack on Excel Passwords
- 06 Feb 2013 » [CTF] Difusing a (binary) bomb
- 11 Oct 2012 » [CTF] OverTheWire Vortex Level 6
- 21 Sep 2012 » [CTF] OverTheWire Vortex Level 5
- 18 Sep 2012 » [CTF] OverTheWire Vortex Level 4
- 14 Sep 2012 » [CTF] OverTheWire Vortex Level 3
- 12 Sep 2012 » [CTF] OverTheWire Vortex Level 2
- 11 Sep 2012 » [CTF] OverTheWire Vortex Level 1
- 10 Sep 2012 » [CTF] OverTheWire Vortex Level 0
- 25 Jul 2012 » Security Metaphors
- 21 Jul 2012 » [CTF] Nebula Wargame Walkthrough
- 15 Jul 2012 » Extracting GNOME Keyring Credentials
- 05 Jul 2012 » Parsing the MBR
- 20 Mar 2012 » Quick Steganography with Matlab
- 16 Nov 2010 » Defensive Programming