Command Injection in LaTeX Workshop

exploitation vulnerability

Haxxoring a Hisense Smart TV

exploitation reverse-engineering vulnerability

Building a Cloudless UniFi Security System That Doesn't Suck


Does This Syncthing Work?

python backup

Game Hacking #3: Hooking Direct3D EndScene()

reverse-engineering c++ binary gamehacking hooking

SROP Exploitation with radare2

r2 radare2 rop exploitation ctf

MemLabs: An Introduction To Memory Forensics

forensics ctf volatility

Fuzzing A GameBoy Emulator With AFL++

fuzzing reversing exploitation

Exploiting A Use-After-Free With radare2 - CTF Challenge

ctf reversing exploitation r2 radare2 cutter heap

36C3 CTF Writeups

ctf reversing exploitation

Open Redirects In State Parameters

research web vulnerability

ROP on ARM with radare2

r2 radare2 rop exploitation arm

In-Process Fuzzing With Frida

frida exploitation fuzzing reverse-engineering

How I Over-Engineered My Dotfiles

linux dotfiles

How Not To Suck At r2wars

radare2 r2 r2wars

Dynamic Instrumentation: Frida And r2frida For Noobs

radare2 r2 frida r2frida ctf reverse-engineering

r2con 2019 CTF Writeups

r2 radare2 ctf reverse-engineering

ROP On x64: What's ret2csu Again?

exploitation rop radare2 r2 ctf ret2csu

Reversing .NET Applications: CCCamp19 CTF CampRE Challenge

ctf dotnet reverse-engineering

Exploiting PHP Deserialization: CCCamp19 CTF PDFCreator Challenge

ctf exploitation deserialization

ROP It Like It's Hot: ROP Basics - Stack Pivoting

reverse-engineering exploitation binary r2 radare2 rop

CryptoCTF 2019 Writeup: Decode Me

ctf crypto

Brute-Forcing x86 Stack Canaries

exploitation ctf radare2 r2

r2con 2019 PwnDebian Challenge: Exploiting radare2 (CVE-2019-14745, CVE-2019-16718)

r2 radare2 reverse-engineering exploit binary cve research

Buffer Overflows on x64 with radare2

r2 radare2 x64 exploitation rop

Game Hacking #2: Coding A CS:GO Hack

reverse-engineering c++ binary gamehacking

Bypassing ASLR and DEP for 32-Bit Binaries With r2

exploitation r2 radare2 reverse-engineering ret2libc

Information Leak in Docker

docker vulnerability

Random Note #092345: Passing binary input via GDB

randomnote gdb exploitation reverse-engineering

Car Hacking: A Short Overview

automotive car-hacking reverse-engineering

Game Hacking #1: Developing Hacks for idTech3 Based Games

c++ binary hooking reverse-engineering gamehacking

Runtime Function Patching

c++ binary cracking reverse-engineering

Random Note #632424: Backup Google Authenticator Data

randomnote backups

Docker Breakout Using X11

docker pentesting hacking

Methods to Upgrade nc Reverse Shells

pentesting shell

2 Common Python Security Issues

pentesting python

Cracking Music Server Software

cracking reverse-engineering

Random Note #12354123: Easy Remote Pair Programming Using Docker and Tmux

randomnote docker vim tmux shell programming

Random Note #23542351: Using the GitHub API to improve Dockerfiles

randomnote docker

A Quick Survey on Anti-Anti-Viruses

c++ malware

Monitor All the Things using Docker and Monit

docker monitoring

Exploiting Unquoted Service Paths For Fun and No Profit

exploitation cve windows

Easy and Secure Backups Using Borg and Docker

docker borg backup

Automated and Tested Dotfile Deployment Using Ansible and Docker

shell dotfiles ansible travis docker

Using Shellcheck and Docker to Automatically Lint Dotfiles

shell dotfiles docker travis

Universal Notifications Using Telegram and cURL

shell notification jenkins travis

Building a CI Docker Pipeline Using Docker in Your Docker

docker jenkins gogs ci


android cve