Two Ways to Pass Data to Your Shellcode

Hi! I decided to spend some time on Linux shellcoding this weekend and this was amazing! Last time I had similar experience on my Assembly Classes at the University, but...

Breaking into Exploit Development with Vulnserver

Hi! I am going to take CTP/OSCE course this summer and I want to be prepared to this journey. That is why I decided to have some fun with the...

Mifare Classic NFC Cards Cryptography Flaws Explained

Hi! I have written an article for Pentest Magazine recently and now it is published! The topic is “Mifare Classic NFC Cards Cryptography Flaws Explained” and there I tried to...

1.4 Billion Clear Text Credentials leaked

Hi! I should mention it here, because I just checked a couple of my friends emails and got a very interesting result. Most likely you know about this leakage. If...

Extending attack surface in distributed environments

I am currently working in the RCNTEC company where I have a deal with distributed environments everyday. Once I had to work with the ISC BIND to implement DNS service...