Apr 4, 2024
13 mins read
A cheatsheet for the pwntools library commonly used for binary exploitation
Nov 10, 2023
2 mins read
A short reference guide on how to leak database metadata with various database software
Sep 23, 2023
8 mins read
How I used my WiFi Pineapple to escape a restrictive kiosk screen
Aug 25, 2023
17 mins read
A tutorial on how to exploit an insecure use of the printf() function, all the way up to RCE
Jul 8, 2023
10 mins read
How I found and exploited a vulnerability in a public Discord bot, along with accidentally contributing to a CVE