Skip content

1 10 17 results

Filter by

  • You're absolutely right: Vibe coding in the world of...

    Explore how AI and 'vibe coding' are transforming penetration testing, from prompt-driven development to modular attack tools and...

    Read more
  • Remote Code Execution in Broadcom Altiris IRM

    A critical unauthenticated remote code execution (RCE) vulnerability was discovered in the Broadcom Symantec Altiris Inventory Rule Management...

    Read more
  • Exploring the Shadow Labyrinth

    How LRQA cracked the Shadow Labyrinth in Hack The Box’s 2025 CTF, using reverse engineering, decryption and custom...

    Read more
  • Next Level Smuggling with WebAssembly

    Using WebAssembly to deliver malicious payloads through HTML smuggling.

    Read more
  • Time Travel Debugging Shellcode with Binary Ninja

    Learn how to debug shellcode using Time Travel Debugging (TTD) in Binary Ninja. This guide walks you through...

    Read more
  • Version Tracking in Ghidra

    When a binary is reverse engineered using Ghidra, various annotations are applied to aid in understanding the binary’s...

    Read more
  • Emulation with Qiling

    Qiling is an emulation framework that builds upon the Unicorn emulator by providing higher level functionality such as...

    Read more
  • Creating an IR Nightmare Drop Box

    A common objective of physical assessments is placement of a drop box to establish communication out of the...

    Read more
  • Repurposing Real TTPs for use on Red Team Engagements

    I recently read an interesting article by Elastic. It provides new analysis of a sophisticated, targeted campaign against...

    Read more
  • WinDbg: using pykd to dump private symbols

    We’ve recently been conducting some reverse engineering and vulnerability analysis on an Anti Virus (AV) product and wanted...

    Read more

Error

Error

No results found

No results found that match your query

Loading results