Posts
Home
Posts
Projects
Posts
Haxxoring a Hisense Smart TV
exploitation
reverse-engineering
Building a Cloudless UniFi Security System That Doesn't Suck
python
Does This Syncthing Work?
python
backup
Game Hacking #3: Hooking Direct3D EndScene()
reverse-engineering
c++
binary
gamehacking
hooking
SROP Exploitation with radare2
r2
radare2
rop
exploitation
ctf
MemLabs: An Introduction To Memory Forensics
forensics
ctf
volatility
Fuzzing A GameBoy Emulator With AFL++
fuzzing
reversing
exploitation
Exploiting A Use-After-Free With radare2 - CTF Challenge
ctf
reversing
exploitation
r2
radare2
cutter
heap
36C3 CTF Writeups
ctf
reversing
exploitation
Open Redirects In State Parameters
research
web
vulnerability
ROP on ARM with radare2
r2
radare2
rop
exploitation
arm
In-Process Fuzzing With Frida
frida
exploitation
fuzzing
reverse-engineering
How I Over-Engineered My Dotfiles
linux
dotfiles
How Not To Suck At r2wars
radare2
r2
r2wars
Dynamic Instrumentation: Frida And r2frida For Noobs
radare2
r2
frida
r2frida
ctf
reverse-engineering
r2con 2019 CTF Writeups
r2
radare2
ctf
reverse-engineering
ROP On x64: What's ret2csu Again?
exploitation
rop
radare2
r2
ctf
ret2csu
Reversing .NET Applications: CCCamp19 CTF CampRE Challenge
ctf
dotnet
reverse-engineering
Exploiting PHP Deserialization: CCCamp19 CTF PDFCreator Challenge
ctf
exploitation
deserialization
ROP It Like It's Hot: ROP Basics - Stack Pivoting
reverse-engineering
exploitation
binary
r2
radare2
rop
CryptoCTF 2019 Writeup: Decode Me
ctf
crypto
Brute-Forcing x86 Stack Canaries
exploitation
ctf
radare2
r2
r2con 2019 PwnDebian Challenge: Exploiting radare2 (CVE-2019-14745, CVE-2019-16718)
r2
radare2
reverse-engineering
exploit
binary
cve
research
Buffer Overflows on x64 with radare2
r2
radare2
x64
exploitation
rop
Game Hacking #2: Coding A CS:GO Hack
reverse-engineering
c++
binary
gamehacking
Bypassing ASLR and DEP for 32-Bit Binaries With r2
exploitation
r2
radare2
reverse-engineering
ret2libc
Information Leak in Docker
docker
vulnerability
Random Note #092345: Passing binary input via GDB
randomnote
gdb
exploitation
reverse-engineering
Car Hacking: A Short Overview
automotive
car-hacking
reverse-engineering
Game Hacking #1: Developing Hacks for idTech3 Based Games
c++
binary
hooking
reverse-engineering
gamehacking
Runtime Function Patching
c++
binary
cracking
reverse-engineering
Random Note #632424: Backup Google Authenticator Data
randomnote
backups
Docker Breakout Using X11
docker
pentesting
hacking
Methods to Upgrade nc Reverse Shells
pentesting
shell
2 Common Python Security Issues
pentesting
python
Cracking Music Server Software
cracking
reverse-engineering
Random Note #12354123: Easy Remote Pair Programming Using Docker and Tmux
randomnote
docker
vim
tmux
shell
programming
Random Note #23542351: Using the GitHub API to improve Dockerfiles
randomnote
docker
A Quick Survey on Anti-Anti-Viruses
c++
malware
Monitor All the Things using Docker and Monit
docker
monitoring
Exploiting Unquoted Service Paths For Fun and No Profit
exploitation
cve
windows
Easy and Secure Backups Using Borg and Docker
docker
borg
backup
Automated and Tested Dotfile Deployment Using Ansible and Docker
shell
dotfiles
ansible
travis
docker
Using Shellcheck and Docker to Automatically Lint Dotfiles
shell
dotfiles
docker
travis
Universal Notifications Using Telegram and cURL
shell
notification
jenkins
travis
Building a CI Docker Pipeline Using Docker in Your Docker
docker
jenkins
gogs
ci
Auditing WriteDiary.com
android
cve