Do u want a c0ff33?
A couple of days ago a company installed some new coffee machines in the office, since we have a team dedicated to cybersecurity, implementing these machines...
A couple of days ago a company installed some new coffee machines in the office, since we have a team dedicated to cybersecurity, implementing these machines...
This is the first non-technical post I’ve written on the blog, and I’m going to talk about my impressions of the OSEP certification offered by Offensive Secu...
SeImpersonatePrivilege allows us to impersonate any token for which we can get a reference, or handle.This privilege is interesting because the Network Servi...
Some services today offer loyalty cards in which the seller expects the customer to have reserved money and spend it only on their service. It is surprising ...
In the previous part of this series of posts, the XOR Cipher was detailed, in this part another cipher technique with Caesar encryption will be investigated ...
In the previous part of this series of posts, the injection process of a shellcode in V was detailed, in this part another injection technique with XOR encry...
In the previous part of this series of posts, the injection process of a shellcode in V was detailed, in this part another injection technique called Process...
Vlang is a statically typed compiled programming language published in 2019 for building maintainable software. It’s similar to Go and its design has also be...
TED in ELK Hace un tiempo desarrollé una aplicación llamada TED (Twitter-based Exploit Detector), más bien una PoC, la cual era capaz de detectar Exploits y ...
TED aka Twitter-based Exploit Detector es un bot en Twitter que nos informará cuando se publique una prueba de concepto o exploit en Twitter, síguelo en @ale...
Some pages made in Wordpress, Joomla, Drupal, Moodle, etc. do not offer version information anywhere. With this tool thanks to the algorithms of Machine Lear...
Dawn 3 es la continuación de Dawn 2, desarrollada también por @whitecr0wz que, como la anterior, está disponible en vulnhub y recientemente se ha añadido en ...
Dawn 2 es una máquina desarrollada por @whitecr0wz que está disponible en vulnhub y que recientemente se ha añadido en https://portal.offensive-security.com/...