Archives
2022
August
Tuesday 9 - RedTeam With OneNote
April
Thursday 28 - RedTeam With Publisher
February
Wednesday 2 - MSDT DLL Hijack UAC bypass
2021
July
Thursday 15 - Hide HTA window for RedTeam
January
Thursday 21 - Launch shellcodes and bypass Antivirus using (...)
2020
September
Friday 18 - Advanced MacroPack payloads: XLM Injection
Friday 18 - EXCEL 4.0 XLM macro in MacroPack Pro
Wednesday 2 - Code Injection - Weaponize GhostWriting (...)
May
2019
December
Sunday 1 - Code Injection - Disable Dynamic Code (...)
Sunday 1 - Code Injection - Exploit WNF callback
September
Thursday 5 - Code Injection - Bypass start address (...)
Sunday 1 - Code Injection - Process PE Injection (...)
February
Sunday 24 - Bypass Windows Defender Attack Surface (...)
January
Wednesday 23 - Yet another sdclt UAC bypass
2018
June
Saturday 23 - Advanced USB key phishing
February
Wednesday 7 - Hacking around HTA files
2017
July
Thursday 20 - Digging passwords in Linux swap
January
Monday 2 - XSS : Get string without quote
2016
December
Thursday 15 - TVT DVR/CCTV webshell exploit
July
Monday 11 - My VBA Bot
May
Monday 30 - VNC to access Kali Linux on Raspberry (...)
2015
November
Tuesday 24 - Bluffing Network Scan Tools
April
Saturday 11 - cve-2014-7822 Linux Kernel D.O.S POC
February
Tuesday 24 - cve-2014-4943 Linux Kernel D.O.S POC
Monday 23 - cve-2014-9322 Linux Kernel D.O.S POC
Monday 23 - cve-2014-3631 Linux Kernel D.O.S POC
2014
August
Sunday 24 - Bypass Antivirus Dynamic Analysis
June
Sunday 29 - String encryption using macro and cryptor
May
Saturday 17 - Fun combining anti-debugging and anti-disassembly
April
Sunday 13 - PE injection explained
March
Tuesday 11 - Hide meterpreter shellcode in executable
Sunday 2 - Code segment encryption
2013
November
Tuesday 5 - Rogue WiFi Access point
2011
August
Wednesday 3 - Hide files using SSDT hooking
April
Thursday 7 - Javascript -Java compatible encryption
January
Thursday 13 - Modify any Java class field using reflection.
Saturday 8 - Enable securitymanager for Spring and (...)
2010
December
Sunday 5 - Linux filesystem security scans
November
Sunday 28 - Glyptodon-1.2 release 2
Wednesday 10 - Implement hash service using JCE
Monday 1 - Glyptodon-1.2 release1
October
Saturday 23 - One time passwords
September
Thursday 23 - Iptables firewall versus nmap and hping3
Tuesday 21 - Iptables firewall versus nmap and hping3
Tuesday 21 - Data stealing with emule
Monday 20 - Iptables firewall versus nmap and hping3
Tuesday 14 - Glyptodon-1.2-b
August
Friday 27 - Linux security using a limited group (PAM (...)
Saturday 14 - How to secure Linux users
June
Thursday 17 - Create a daily system-update script
Thursday 10 - Build a recovery toolkit
Tuesday 8 - OS security basics
Thursday 3 - MITM arp-spoofing
Wednesday 2 - The cookie factory
Tuesday 1 - Setup a buffer overflow testing environment
May
Monday 31 - Features suggestions
Monday 31 - Report bugs
Monday 31 - bash suggestions
Sunday 30 - POSIX file capabilities, the dark side
Sunday 30 - Glyptodon-1.1-b