Below is a list of all posts available on this blog.
- Creating a credential harvesting (phishing) page
- HTB Cyber Apocalypse – Pandora’s Bane (Forensics)
- HTB Business CTF 2022 – Perseverance (Forensics)
- HTB Business CTF 2022 – Trade (Cloud)
- HTB Business CTF 2022 – Commercial (FullPwn)
- Vulnserver – Exploiting the KSTET command (with space limitations)
- Vulnserver – Exploiting the TRUN Command (Part 2)
- Vulnserver – Exploiting the TRUN command (Part 1)
- Modifying Empire payloads to avoid detection
- Backdooring a .NET application with dnSpy
- Analyzing a memory dump for malicious activity with volatility
- TryHackMe – Throwback Network (Part 5 – Corporate.local and TBSEC-DC01)
- TryHackMe – Throwback Network (Part 4 – TIME and DC01)
- TryHackMe – Throwback Network (Part 3 – PROD and TIME)
- TryHackMe – ThrowBack Network (Part 2 – MAIL and WS-01)
- TryHackMe – Throwback Network (Part 1 – FW01 and MAIL)
- TryHackMe – Overpass
- TryHackMe – dogcat
- TryHackMe – Attacktive Directory
- TryHackMe – Vulnversity
- Vulnhub – Wintermute 1
- Vulnhub – Pwnlab: init
- Hack the Box #9 – Bastard
- Hack the Box #8 – Shocker
- Hack the Box #7 – Poison
- VulnHub – Brainpan (Part 2)
- VulnHub – Brainpan (Part 1)
- VulnHub – Mr. Robot 1
- Hack the Box – #6 – Blocky
- Hack the Box – #5 – Bashed
- Hack the Box – #4 – Optimum
- Hack the Box – #3 – Bank
- Hack the Box – #2 – Grandpa
- Hack the Box – #1 – Beep
- Practical Malware Analysis – Chapter 7: Analyzing Malicious Windows Programs
- Practical Malware Analysis – Chapter 6: Recognizing C Code Constructs in Assembly
- Practical Malware Analysis – Chapter 4 & 5: Adventures in Assembly Code
- Practical Malware Analysis – Chapter 3: Basic Dynamic Analysis
- Practical Malware Analysis – The Setup
- Let’s get started!