Skip to main content

Posts

Reversing Challenge - Hack The Box - Impossible Password

Writeup - Hack The Box - Brainfuck

Writeup - Hack The Box - Lame

Nexpose Vulnerability Scan by Using Rest-API

A Cheatsheet for Docker

Simple API for Secret Scanning

Useful SQL Queries for Nexpose

Database Security Notes

Notes About Improving Technical Writing

Some Reverse Engineering Tools

Understanding HTTP Security Headers

Writeup - OverTheWire Bandit

Using Virtualbox/phpVirtualbox on Ubuntu Server

Create an Encrypted File Container by Using Luks

Exploitation Basics - Memory

Exploitation Basics - Registers

Exploitation Basics - x86 Assembly

Memory Protection Mechanisms

Exploit Development for Beginners

Linux System Programming - Part 7

Linux System Programming - Part 6

Linux System Programming - Part 5

Linux System Programming - Part 4

Linux System Programming - Part 3

Linux System Programming - Part 2

Linux System Programming - Part 1

Win32 System Programming - Part 5

Win32 System Programming - Part 4

Win32 System Programming - Part 3

Win32 System Programming - Part 2

Win32 System Programming - Part 1