Sep 29, 2024
25 mins read
Cracking 12-character .zip passwords, exploiting a sneaky C vulnerability, and escalating Python's .format() to RCE for the first time ever.
Apr 4, 2024
13 mins read
A cheatsheet for the pwntools library commonly used for binary exploitation
Nov 10, 2023
2 mins read
A short reference guide on how to leak database metadata with various database software
Sep 23, 2023
8 mins read
How I used my WiFi Pineapple to escape a restrictive kiosk screen
Jul 8, 2023
10 mins read
How I found and exploited a vulnerability in a public Discord bot, along with accidentally contributing to a CVE