As already explained in our article on proxies, there are many reasons for using a reverse proxy. But how do [...]
As promised on Twitter this post will document my steps through the OSWE exam preperation. Searching for available study material [...]
Welcome to my next blog post. Today I want to show you some basic pentesting stuff. We will manually backdooring [...]
This is just another very short usage guide for one of my little helper for pentesters and the like. During [...]
This is a short usage guide which should explain my simple wrapper for the spike fuzzer, which you can find [...]
As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until [...]
While doing my preperation for the OSCE i found an exploit for the coolpalyer+ version 2.19.1 from 2009. I decided to [...]
The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files [...]
This task (pick up 3 shellcodes from Shell-Storm and use polymorphism to beat pattern matching) sounds really sophisticated but you [...]
Got time to read? This tasks was a bigger one. We have to pick 3 random metasploit payloads and analyze [...]
You are currently viewing a placeholder content from Facebook. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from Instagram. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More InformationYou are currently viewing a placeholder content from X. To access the actual content, click the button below. Please note that doing so will share data with third-party providers.
More Information