Schrems Trampled on the Shield
The EU-US Privacy Shield agreement is now invalid
This blog post might give you a better understanding of what has been achieved by Max Schrems...
Tribe of Hackers Red Team 1.0
Learning from the Red Team Expert Marcus J. Carey
This post is based on the book 'Tribe of Hackers Red Team' by Carey and Jin. Here we share an...
Exploiting MiTeC NetScanner
Tricky SEH exploit
This post will show how to build our version of an exploit for NetScanner 126.96.36.199, which was...
Vulnserver Reverse Engineering
The devil is in the details
This post will show how use reverse engineering techniques and tools to find vulnerabilities on...
Exploiting QuickZip 4.x
This post will show how to build our version of an exploit for QuickZip 4.x SEH overwrite.
Trust no one
This article will show a way of creating a backdoor that will be injected into PuTTY, a widely...
Online Voting for a New President?
The trouble with OmniBallot and other voting platforms
In this post, we show you the exposed vulnerabilities of one of the many online voting options...
LTER: Overcoming Bad Chars
Bad chars everywhere
This post will show how to exploit the Vulnserver LTER command on where we will need to bypass...
KSTET: Multistage exploiting
Exploiting in stages
This post will show how to exploit the Vulnserver KSTET command using a socket reuse method.