From 21.11. The SECUTA Information Security Conference will take place in Garmisch-Partenkirchen from November 1 to 23, 2018. There, the [...]
This is just another very short usage guide for one of my little helper for pentesters and the like. During [...]
This is a short usage guide which should explain my simple wrapper for the spike fuzzer, which you can find [...]
Vulnerable software FTP server 8.0f(g) Vulnerability Local Buffer Overflow (SEH protected)-> Code Execution Time Line 01/24/2018 Vendor informed 01/30/2018 [...]
As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until [...]
While doing my preperation for the OSCE i found an exploit for the coolpalyer+ version 2.19.1 from 2009. I decided to [...]
On 27.02.2018 between 1 and 4 p.m., the Munich Chamber of Commerce and Industry is offering a roundtable discussion for [...]
The tiresome topic of passwords and their management. I am always asked how to solve this problem. Therefore, I decided [...]
The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files [...]
This task (pick up 3 shellcodes from Shell-Storm and use polymorphism to beat pattern matching) sounds really sophisticated but you [...]
You are currently viewing a placeholder content from Facebook. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Instagram. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from X. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information