Sep 29, 2024
25 mins read
Cracking 12-character .zip passwords, exploiting a sneaky C vulnerability, and escalating Python's .format() to RCE for the first time ever.
Apr 4, 2024
13 mins read
A cheatsheet for the pwntools library commonly used for binary exploitation
Nov 10, 2023
2 mins read
A short reference guide on how to leak database metadata with various database software
Sep 23, 2023
8 mins read
How I used my WiFi Pineapple to escape a restrictive kiosk screen
Aug 25, 2023
17 mins read
A tutorial on how to exploit an insecure use of the printf() function, all the way up to RCE