Recent Posts

Do u want a c0ff33?

8 minute read

A couple of days ago a company installed some new coffee machines in the office, since we have a team dedicated to cybersecurity, implementing these machines...

OSEP Review

5 minute read

This is the first non-technical post I’ve written on the blog, and I’m going to talk about my impressions of the OSEP certification offered by Offensive Secu...

Abusing AC in a MIFARE Classic 1k

10 minute read

Some services today offer loyalty cards in which the seller expects the customer to have reserved money and spend it only on their service. It is surprising ...

OffensiVe Security with V 4 - Caesar

4 minute read

In the previous part of this series of posts, the XOR Cipher was detailed, in this part another cipher technique with Caesar encryption will be investigated ...

TED in ELK

4 minute read

TED in ELK Hace un tiempo desarrollé una aplicación llamada TED (Twitter-based Exploit Detector), más bien una PoC, la cual era capaz de detectar Exploits y ...

OffensiVe Security with V 3 - XOR

2 minute read

In the previous part of this series of posts, the injection process of a shellcode in V was detailed, in this part another injection technique with XOR encry...

OffensiVe Security with V - Shellcode Execution

8 minute read

Vlang is a statically typed compiled programming language published in 2019 for building maintainable software. It’s similar to Go and its design has also be...

Dawn 3: Vanilla Buffer Overflow

5 minute read

Dawn 3 es la continuación de Dawn 2, desarrollada también por @whitecr0wz que, como la anterior, está disponible en vulnhub y recientemente se ha añadido en ...

Dawn 2: Vanilla Buffer Overflow

7 minute read

Dawn 2 es una máquina desarrollada por @whitecr0wz que está disponible en vulnhub y que recientemente se ha añadido en https://portal.offensive-security.com/...

Twitter-based Exploit Detector

13 minute read

TED aka Twitter-based Exploit Detector es un bot en Twitter que nos informará cuando se publique una prueba de concepto o exploit en Twitter, síguelo en @ale...