Hiding IAT entries to evade detection.
Ways of gaining access to WPA-PSK networks.
Getting started with Cobalt Strike.
Exploiting LFI vulnerabilities in web applications.
Decoding Flask signed session cookies.
SSTI attacks against Python Flask applications.
Cyber Apocalypse CTF 2023 challenge writeups.
Using Nim to write some simple tools.
Writing a process injection tool using direct system calls.
Unlocking LUKS encrypted disks remotely.
Reverse shells in x64 assembly.
Writing Shellcode for Windows 11.