Advanced Search
Search Results
55 total results found
Français
Le contenu HideAndSec dans la langue de Molière.
Premier exploit
Premier exploit Maintenant que vous avez vu comment modifier la sauvegarde d'EIP d'une fonction ...
HackTM CTF 2020 Writeup
Since the CTF is still active I wont be dropping the flags. You can follow along and complete the...
NorthSec 2021 Badge Writeup
To learn more about the badge itself and the development behind the scenes I would recommend wa...
SSRF Series
1. INTRO SSRF (Server-Side Request Forgery: server-side request forgery) is a fake exploit server...
CSP Series
1. Intro CSP (Content Security Policy) is there / in-place to mitigate some attacks, such as xss,...
Brève introduction
Tout d'abord qu'est ce qu'un buffer overflow? Et à quoi ça sert? Les buffer overflow sont des fa...
Passons à la pratique!
Première phase de l'exploitation Nous allons desormais nous appuyer sur le programme précédement...
Introduction to Cobalt Strike
0x01 What is Cobalt Strike "Cobalt Strike is software for Adversary Simulations and Red Team O...
Spawning TTY Shells
Shell Spawning Python python -c 'import pty; pty.spawn("/bin/sh")' python3 -c 'import pty; pty...
Cobalt Strike Process Injection
0x01 Intro Here are my thoughts on process injection and share some technical details about Coba...
Domain Control Elevation
0x01 Preface Just a collection of personal notes covering the following: Password in GPP and SY...
Defenses Evasion (The Quick'n Dirty)
This is just a quick and dirty overview of some defense evasion tactics that are out there for so...
The RC4 encryption
The RC4 encryption algorithm is a symmetric encryption algorithm. Symmetric encryption algorithm...
Windows thread control
Multithreading undoubtedly brings a lot of convenience and improves a lot of development efficien...
Direct system call injection process to avoid anti-kill
The content is as titled. This is also a technology I have used for a long time. I have also pos...
How to Hide Your CobaltStrike
CobaltStrike Overview Cobalt Strike is the most prevalent threat emulation software packages use...
NahamCon CTF 2020 Writeup
NahamCon CTF 2020 Writeup URL: https://ctf.nahamcon.com/challenges I got board on the weekend a...
Reverse shells
Listener Before any reverse shell, you need to set up the listener, which will listen to a port a...
English
For english people
Web
The World Wide Web
Hack The Box | Machines
Linux and Windows machine writeups
A propos de nous
Qui sommes-nous et qui se trouve derrière le masque ?
Linux
Linux intrusion testing methodologies, tools, and techniques
Windows
Windows intrusion testing methodologies, tools, and techniques
Red Teaming
Red teaming methodologies, tools, and techniques
About Us
Who are we and who sits behind the mask?
Pwn
Let's pwn the wrld
CTF
Do you want some writeups kidz ?
Cache Poisoning
What is it ? Cache poisoning was popularized in 2018, although this attack existed long before, a...
Cheatsheets
Articles with ready to use commands for pentest and CTF
Research
Searching 0days for the mama
Windows
Linux
[FR] Introduction aux Buffer Overflow
Nous allons dans cet article voir qu'est ce qu'un buffer overflow et comment exploiter notre prem...
Attacks
Microsoft
Different cheatsheets useful in Windows and Active Directory environment
HideAndSec
We are a group of cybersecurity enthusiasts interested in various areas including software securi...