Advanced Search
Search Results
45 total results found
Français
Le contenu HideAndSec dans la langue de Molière.
NahamCon CTF 2020 Writeup
NahamCon CTF 2020 Writeup URL: https://ctf.nahamcon.com/challenges I got board on the weekend a...
Windows thread control
Multithreading undoubtedly brings a lot of convenience and improves a lot of development efficien...
The RC4 encryption
The RC4 encryption algorithm is a symmetric encryption algorithm. Symmetric encryption algorithm...
Defenses Evasion (The Quick'n Dirty)
This is just a quick and dirty overview of some defense evasion tactics that are out there for so...
Domain Control Elevation
0x01 Preface Just a collection of personal notes covering the following: Password in GPP and SY...
Cobalt Strike Process Injection
0x01 Intro Here are my thoughts on process injection and share some technical details about Coba...
Introduction to Cobalt Strike
0x01 What is Cobalt Strike "Cobalt Strike is software for Adversary Simulations and Red Team O...
Premier exploit
Premier exploit Maintenant que vous avez vu comment modifier la sauvegarde d'EIP d'une fonction ...
Passons à la pratique!
Première phase de l'exploitation Nous allons desormais nous appuyer sur le programme précédement...
Brève introduction
Tout d'abord qu'est ce qu'un buffer overflow? Et à quoi ça sert? Les buffer overflow sont des fa...
CSP Series
1. Intro CSP (Content Security Policy) is there / in-place to mitigate some attacks, such as xss,...
SSRF Series
1. INTRO SSRF (Server-Side Request Forgery: server-side request forgery) is a fake exploit server...
Bug Bounty
Obtain subdomains and links from the target host: for h in $(cat hosts.txt); do curl -siL https:...
NorthSec 2021 Badge Writeup
To learn more about the badge itself and the development behind the scenes I would recommend wa...
HackTM CTF 2020 Writeup
Since the CTF is still active I wont be dropping the flags. You can follow along and complete the...
[FR] Système des capabilities Linux
Introduction et principes généraux des Capabilities Lorsque l’on veut lancer un processus avec c...
English
For english people
CTF
Do you want some writeups kidz ?
Linux
Linux intrusion testing methodologies, tools, and techniques
Windows
Windows intrusion testing methodologies, tools, and techniques
Red Teaming
Red teaming methodologies, tools, and techniques
About Us
Who are we and who sits behind the mask?
Pwn
Let's pwn the wrld
Web
The World Wide Web
Cheatsheets
Articles with ready to use commands for pentest and CTF
Spawning TTY Shells
Shell Spawning Python python -c 'import pty; pty.spawn("/bin/sh")' python3 -c 'import pty; pty...
Research
Searching 0days for the mama
[FR] Introduction aux Buffer Overflow
Nous allons dans cet article voir qu'est ce qu'un buffer overflow et comment exploiter notre prem...
Attacks
Microsoft
Different cheatsheets useful in Windows and Active Directory environment
Cache Poisoning
What is it ? Cache poisoning was popularized in 2018, although this attack existed long before, a...
Reverse shells
Listener Before any reverse shell, you need to set up the listener, which will listen to a port a...
Direct system call injection process to avoid anti-kill
The content is as titled. This is also a technology I have used for a long time. I have also pos...