Posts

MemLabs: An Introduction To Memory Forensics

forensics ctf volatility

Fuzzing A GameBoy Emulator With AFL++

fuzzing reversing exploiting

Exploiting A Use-After-Free With radare2 - CTF Challenge

ctf reversing exploiting r2 radare2 cutter heap

36C3 CTF Writeups

ctf reversing exploiting

Open Redirects In State Parameters

research web vulnerability

ROP on ARM with radare2

r2 radare2 rop exploitation arm

In-Process Fuzzing With Frida

frida exploiting fuzzing reverse-engineering

How I Over-Engineered My Dotfiles

linux dotfiles

How Not To Suck At r2wars

radare2 r2 r2wars

Dynamic Instrumentation: Frida And r2frida For Noobs

radare2 r2 frida r2frida ctf reverse-engineering

r2con 2019 CTF Writeups

r2 radare2 ctf reverse-engineering

ROP On x64: What's ret2csu Again?

exploiting rop radare2 r2 ctf ret2csu

Reversing .NET Applications: CCCamp19 CTF CampRE Challenge

ctf dotnet reverse-engineering

Exploiting PHP Deserialization: CCCamp19 CTF PDFCreator Challenge

ctf exploiting deserialization

ROP It Like It's Hot: ROP Basics - Stack Pivoting

reverse-engineering exploiting binary r2 radare2 rop

CryptoCTF 2019 Writeup: Decode Me

ctf crypto

Brute-Forcing x86 Stack Canaries

exploiting ctf radare2 r2

r2con 2019 PwnDebian Challenge: Exploiting radare2 (CVE-2019-14745, CVE-2019-16718)

r2 radare2 reverse-engineering exploit binary cve research

Buffer Overflows on x64 with radare2

r2 radare2 x64 exploiting rop

Coding A CS:GO Hack

reverse-engineering c++ binary

Bypassing ASLR and DEP for 32-Bit Binaries With r2

exploiting r2 radare2 reverse-engineering ret2libc

Information Leak in Docker

docker vulnerability

Random Note #092345: Passing binary input via GDB

randomnote gdb exploiting reverse-engineering

Car Hacking: A Short Overview

automotive car-hacking reverse-engineering

Creating A Multiplayer Game Hack

c++ binary hooking reverse-engineering

Runtime Function Patching

c++ binary cracking reverse-engineering

Random Note #632424: Backup Google Authenticator Data

randomnote backups

Docker Breakout Using X11

docker pentesting hacking

Methods to Upgrade nc Reverse Shells

pentesting shell

2 Common Python Security Issues

pentesting python

Cracking Music Server Software

cracking reverse-engineering

Random Note #12354123: Easy Remote Pair Programming Using Docker and Tmux

randomnote docker vim tmux shell programming

Random Note #23542351: Using the GitHub API to improve Dockerfiles

randomnote docker

A Quick Survey on Anti-Anti-Viruses

c++ malware

Monitor All the Things using Docker and Monit

docker monitoring

Exploiting Unqoted Service Paths For Fun and No Profit

exploit cve windows

Easy and Secure Backups Using Borg and Docker

docker borg

Automated and Tested Dotfile Deployment Using Ansible and Docker

shell dotfiles ansible travis docker

Using Shellcheck and Docker to Automatically Lint Dotfiles

shell dotfiles docker travis

Universal Notifications Using Telegram and cURL

shell notification jenkins travis

Building a CI Docker Pipeline Using Docker in Your Docker

docker jenkins gogs ci

Auditing WriteDiary.com

android cve