loading...

Buffer Overflow on HackTheBox Frolic - with Metasploit

Reactions 14
14 min read

Writeup: HackTheBox Bank - NO Metasploit

Reactions 0
8 min read

#discussWhat is the difference between yarn and npm these days?

Reactions 38 Comments 19
1 min read

#discussSSR apps - obfuscate your code?

Reactions 3
1 min read

Writeup: HackTheBox Bastard - NO Metasploit

Reactions 4
9 min read

Writeup: HackTheBox Grandpa and Granny - with Metasploit

Reactions 1
3 min read

Writeup: HackTheBox Arctic - with Metasploit

Reactions 5
3 min read

Writeup: HackTheBox Beep - with Metasploit

Reactions 1
8 min read

Hosting a Markdown Wiki For Pentests and Profit

Reactions 2
17 min read

Writeup: HackTheBox Optimum - with Metasploit

Reactions 4
3 min read

Writeup: HackTheBox Devel - with Metasploit

Reactions 4
4 min read

Writeup: HackTheBox Legacy - with Metasploit

Reactions 7
1 min read

Writeup: HackTheBox Lame - with Metasploit

Reactions 9
5 min read

#discussWhy Quasar? Why Nuxt? Why Vue?

Reactions 8 Comments 6
1 min read

Writeup: SANS Holiday Hack Challenge 2019

Reactions 7
16 min read

How AWS's EC2 Instance Metadata V2 Prevents SSRF

Reactions 6
7 min read

#discussWhat API documentation generator/tool do you use?

Reactions 77 Comments 35
2 min read

#showdevGalaxy Collections Part 3: Integration Tests with Molecule

Reactions 4
4 min read

#showdevGalaxy Collections Part 1: Extending Ansible through Custom Plugins

Reactions 5
16 min read

#showdevGalaxy Collections Part 2: Automatically Update Your Collection with Github Actions

Reactions 4
16 min read

Writeup: Derbycon 9: Bank of America CTF

Reactions 8
34 min read

#discussWho's Using Isolates? (Cloudflare article)

Reactions 10 Comments 5
1 min read

Demystifying SOP and CSP, featuring CORS

Reactions 16
11 min read

#discussHow do you authenticate your users?

Reactions 6 Comments 10
1 min read

Encrypting Files in a Post-PGP Age

Reactions 23 Comments 3
5 min read

Post-Quantum Cryptography, Part 2: Supersingular Isogenies

Reactions 12
6 min read

Post-Quantum Cryptography, Part 1: Quantum Computing

Reactions 26 Comments 3
7 min read

Random vs. Pseudorandom

Reactions 40 Comments 2
9 min read
loading...