Posts

Reinschauer: Remotely Controlling Windows Machines

golang dotnet programming windows

Cheating in Unity Games Because Why Not?

frida gamehacking binary

This Weird YouTube Trick

python programming shell

Analysis of Satisfyer Toys: Discovering an Authentication Bypass with r2 and Frida

radare2 r2 frida r2frida reverse-engineering web vulnerability

Command Injection in LaTeX Workshop

exploitation vulnerability

Haxxoring a Hisense Smart TV

exploitation reverse-engineering vulnerability

Building a Cloudless UniFi Security System That Doesn't Suck

python

Does This Syncthing Work?

python backup

Game Hacking #3: Hooking Direct3D EndScene()

reverse-engineering c++ binary gamehacking hooking

SROP Exploitation with radare2

r2 radare2 rop exploitation ctf

MemLabs: An Introduction To Memory Forensics

forensics ctf volatility

Fuzzing A GameBoy Emulator With AFL++

fuzzing reversing exploitation

Exploiting A Use-After-Free With radare2 - CTF Challenge

ctf reversing exploitation r2 radare2 cutter heap

36C3 CTF Writeups

ctf reversing exploitation

Open Redirects In State Parameters

research web vulnerability

ROP on ARM with radare2

r2 radare2 rop exploitation arm

In-Process Fuzzing With Frida

frida exploitation fuzzing reverse-engineering

How I Over-Engineered My Dotfiles

linux dotfiles

How Not To Suck At r2wars

radare2 r2 r2wars

Dynamic Instrumentation: Frida And r2frida For Noobs

radare2 r2 frida r2frida ctf reverse-engineering

r2con 2019 CTF Writeups

r2 radare2 ctf reverse-engineering

ROP On x64: What's ret2csu Again?

exploitation rop radare2 r2 ctf ret2csu

Reversing .NET Applications: CCCamp19 CTF CampRE Challenge

ctf dotnet reverse-engineering

Exploiting PHP Deserialization: CCCamp19 CTF PDFCreator Challenge

ctf exploitation deserialization

ROP It Like It's Hot: ROP Basics - Stack Pivoting

reverse-engineering exploitation binary r2 radare2 rop

CryptoCTF 2019 Writeup: Decode Me

ctf crypto

Brute-Forcing x86 Stack Canaries

exploitation ctf radare2 r2

r2con 2019 PwnDebian Challenge: Exploiting radare2 (CVE-2019-14745, CVE-2019-16718)

r2 radare2 reverse-engineering exploitation binary cve research vulnerability

Buffer Overflows on x64 with radare2

r2 radare2 x64 exploitation rop

Game Hacking #2: Coding A CS:GO Hack

reverse-engineering c++ binary gamehacking

Bypassing ASLR and DEP for 32-Bit Binaries With r2

exploitation r2 radare2 reverse-engineering ret2libc

Information Leak in Docker

docker vulnerability

Passing binary input via GDB

gdb exploitation reverse-engineering

Car Hacking: A Short Overview

automotive car-hacking reverse-engineering

Game Hacking #1: Developing Hacks for idTech3 Based Games

c++ binary hooking reverse-engineering gamehacking

Runtime Function Patching

c++ binary cracking reverse-engineering gamehacking

Backup Google Authenticator Data

backups

Docker Breakout Using X11

docker pentesting hacking

Methods to Upgrade nc Reverse Shells

pentesting shell

2 Common Python Security Issues

pentesting python

Cracking Music Server Software

cracking reverse-engineering

Easy Remote Pair Programming Using Docker and Tmux

docker vim tmux shell programming

Using the GitHub API to improve Dockerfiles

docker

A Quick Survey on Anti-Anti-Viruses

c++ malware

Monitor All the Things using Docker and Monit

docker monitoring

Exploiting Unquoted Service Paths For Fun and No Profit

exploitation cve windows

Easy and Secure Backups Using Borg and Docker

docker borg backup

Automated and Tested Dotfile Deployment Using Ansible and Docker

shell dotfiles ansible travis docker

Using Shellcheck and Docker to Automatically Lint Dotfiles

shell dotfiles docker travis

Universal Notifications Using Telegram and cURL

shell notification jenkins travis

Building a CI Docker Pipeline Using Docker in Your Docker

docker jenkins gogs ci

Auditing WriteDiary.com

android cve