Keyboard Shortcuts:
g + h: Home
g + b: Blog
g + c: Cheat Sheets
g + t: MacOS Tips
g + a: About
j / k: Up/Down
h / l: Next/Previous
?: Help
g + h: Home
g + b: Blog
g + c: Cheat Sheets
g + t: MacOS Tips
g + a: About
j / k: Up/Down
h / l: Next/Previous
?: Help
Keyboard Shortcuts
g + h : | Home |
g + b : | Blog |
g + c : | Cheat Sheets |
g + t : | MacOS Tips |
g + a : | About |
j / k : | Up/Down |
h / l : | Next/Previous |
? : | Help |
<Esc> : | Close |
Security
- 01 Jun 2018 » (Retro) Hunting
- 15 Feb 2018 » How (Not) To Encrypt Google Docs
- 07 Aug 2013 » Store Encrypted Files on Google Drive
- 02 Mar 2013 » Dictionary Attack on Excel Passwords
- 25 Jul 2012 » Security Metaphors
- 15 Jul 2012 » Extracting GNOME Keyring Credentials
- 16 Nov 2010 » Defensive Programming
Steganography
- 17 Jan 2014 » LSB Steganography with Python
- 01 Nov 2013 » Hidden Command Listener
- 20 Mar 2012 » Quick Steganography with Matlab
Deep-Dive
- 18 Nov 2023 » Neat privilege escalation tricks
- 17 Sep 2017 » Hacking GNOME Minesweeper
- 10 Sep 2017 » Serene Binary Analysis with Angr
- 23 Aug 2017 » Exploring Procdot
- 09 Aug 2017 » Exploring Prefetch Part 2
- 29 Jun 2017 » Exploring Prefetch Part 1
- 13 May 2017 » Breaking Neural Networks
- 05 Jul 2012 » Parsing the MBR
CTF
- 03 Jun 2019 » flAWS - Part 2 - Defender
- 01 Jun 2019 » flAWS - Part 2 - Attacker
- 01 May 2019 » flAWS - Part 1
- 18 May 2018 » [CTF] Under the Wire 5 - Trebek
- 16 May 2018 » [CTF] Under the Wire 4 - Oracle
- 14 May 2018 » [CTF] Under the Wire 3 - Groot
- 12 May 2018 » [CTF] Under the Wire 2 - Cyborg
- 10 May 2018 » [CTF] Under the Wire 1 - Century
- 10 Feb 2018 » [CTF] BoE 2 - "Go with the (net)flow"
- 10 Feb 2018 » [CTF] BoE 1 - "I smell a rat"
- 01 Jun 2017 » [CTF] Why So Fancy?
- 05 May 2017 » [CTF] Sectalks London - 08
- 04 Feb 2017 » [CTF] Sectalks London - 05
- 08 Aug 2016 » [CTF] Sectalks London - 04
- 01 Aug 2016 » [CTF] Quantum Malware
- 17 Mar 2016 » [CTF] Binary Master Lieutenant - 5
- 10 Mar 2016 » [CTF] Binary Master Lieutenant - 4
- 02 Mar 2016 » [CTF] Binary Master Lieutenant - 3
- 23 Feb 2016 » [CTF] Binary Master Lieutenant - 2
- 16 Feb 2016 » [CTF] Binary Master Lieutenant - 1
- 09 Feb 2016 » [CTF] Binary Master Ensign - 5
- 28 Jan 2016 » [CTF] Binary Master Ensign - 4
- 21 Jan 2016 » [CTF] Binary Master Ensign - 3
- 14 Jan 2016 » [CTF] Binary Master Ensign - 2
- 07 Jan 2016 » [CTF] Binary Master Ensign - 1
- 05 Aug 2013 » [CTF] Coursera Malicious Software Challenge
- 06 Feb 2013 » [CTF] Difusing a (binary) bomb
- 11 Oct 2012 » [CTF] OverTheWire Vortex Level 6
- 21 Sep 2012 » [CTF] OverTheWire Vortex Level 5
- 18 Sep 2012 » [CTF] OverTheWire Vortex Level 4
- 14 Sep 2012 » [CTF] OverTheWire Vortex Level 3
- 12 Sep 2012 » [CTF] OverTheWire Vortex Level 2
- 11 Sep 2012 » [CTF] OverTheWire Vortex Level 1
- 10 Sep 2012 » [CTF] OverTheWire Vortex Level 0
- 21 Jul 2012 » [CTF] Nebula Wargame Walkthrough
OverTheWire
- 11 Oct 2012 » [CTF] OverTheWire Vortex Level 6
- 21 Sep 2012 » [CTF] OverTheWire Vortex Level 5
- 18 Sep 2012 » [CTF] OverTheWire Vortex Level 4
- 14 Sep 2012 » [CTF] OverTheWire Vortex Level 3
- 12 Sep 2012 » [CTF] OverTheWire Vortex Level 2
- 11 Sep 2012 » [CTF] OverTheWire Vortex Level 1
- 10 Sep 2012 » [CTF] OverTheWire Vortex Level 0
Experiment
- 03 Nov 2022 » Solving a Wooden Cube Puzzle
- 27 May 2018 » post_url for Collections in Jekyll
- 27 Feb 2017 » Dawkins' Weasel
- 25 Feb 2017 » Control Website With Keyboard Shortcuts
- 01 Apr 2013 » Fair Result With Biased Coin
SLAE
- 13 Sep 2013 » [SLAE ?] Bind TCP Shellcode with Password
- 05 Sep 2013 » [SLAE 7] AES Shellcode crypter
- 01 Sep 2013 » [SLAE 6] Polymorphic Shellcodes
- 25 Aug 2013 » [SLAE 5] Metasploit meterpreter/reverse_tcp Shellcode
- 17 Aug 2013 » [SLAE 5] Metasploit Shell Find Port
- 11 Aug 2013 » [SLAE 5] Metasploit Shellcode Analysis
- 04 Aug 2013 » [SLAE 4] Custom Encoding Scheme
- 25 Jul 2013 » [SLAE 3] Egghunter Shellcode
- 18 Jul 2013 » [SLAE 2] Reverse TCP Shellcode
- 10 Jul 2013 » [SLAE 1] Bind TCP Shellcode
Opinion
- 14 Mar 2020 » Advanced Web Attacks And Exploitation - Course and OSWE Exam Review
- 16 Aug 2017 » Progressing In Infosec
- 25 Jun 2017 » The Technical Interview part 2
- 10 Jun 2017 » The Technical Interview part 1
- 02 Mar 2014 » Cracking the Perimeter - Course and OSCE Exam Review
Binary-Master
- 17 Mar 2016 » [CTF] Binary Master Lieutenant - 5
- 10 Mar 2016 » [CTF] Binary Master Lieutenant - 4
- 02 Mar 2016 » [CTF] Binary Master Lieutenant - 3
- 23 Feb 2016 » [CTF] Binary Master Lieutenant - 2
- 16 Feb 2016 » [CTF] Binary Master Lieutenant - 1
- 09 Feb 2016 » [CTF] Binary Master Ensign - 5
- 28 Jan 2016 » [CTF] Binary Master Ensign - 4
- 21 Jan 2016 » [CTF] Binary Master Ensign - 3
- 14 Jan 2016 » [CTF] Binary Master Ensign - 2
- 07 Jan 2016 » [CTF] Binary Master Ensign - 1
CyberSecurityChallenge
- 10 Feb 2018 » [CTF] BoE 2 - "Go with the (net)flow"
- 10 Feb 2018 » [CTF] BoE 1 - "I smell a rat"
- 01 Aug 2016 » [CTF] Quantum Malware
SecTalks
- 05 May 2017 » [CTF] Sectalks London - 08
- 04 Feb 2017 » [CTF] Sectalks London - 05
- 08 Aug 2016 » [CTF] Sectalks London - 04
SecurityBricks
- 02 Aug 2017 » Use Bluetooth Device For Better Security
- 25 Jul 2017 » Token-based Authentication for SSH
- 17 Jul 2017 » Using Tokens in Ubuntu with PGP
- 09 Jul 2017 » KeePass Password Manager With 2FA
- 02 Jul 2017 » Physical OPSEC Basics
- 06 May 2017 » Preventing Evil Maid Attacks
Hardware
- 01 Dec 2017 » Building A Humidity Temperature Rig With Arduino
- 01 Sep 2017 » Investigating A Hardware Keylogger
UnderTheWire
- 18 May 2018 » [CTF] Under the Wire 5 - Trebek
- 16 May 2018 » [CTF] Under the Wire 4 - Oracle
- 14 May 2018 » [CTF] Under the Wire 3 - Groot
- 12 May 2018 » [CTF] Under the Wire 2 - Cyborg
- 10 May 2018 » [CTF] Under the Wire 1 - Century
flAWS
- 03 Jun 2019 » flAWS - Part 2 - Defender
- 01 Jun 2019 » flAWS - Part 2 - Attacker
- 01 May 2019 » flAWS - Part 1
AWS
- 03 Jun 2019 » flAWS - Part 2 - Defender
- 01 Jun 2019 » flAWS - Part 2 - Attacker
- 01 May 2019 » flAWS - Part 1