Explore >> Select a destination


You are here

blog.brixit.nl
| | blog.danman.eu
2.1 parsecs away

Travel
| |
| | blog.the.al
3.8 parsecs away

Travel
| | In case you missed previous episodes, here is Part 1, where you can read about this DualShock 4 totally messed up that I'm trying torepair and Part 2 where I...
| | ripitapart.com
5.7 parsecs away

Travel
| | As seen on Hackaday! TL;DR - If you have a ZTE WF721 that's PIN-locked your SIM card, try 2376. Recently I picked up a used Samsung Galaxy Core LTE smartphone from a relative after they upgraded to an iPhone. As the Core LTE is a low-end smartphone, I suspected that the phone was SIM locked...
| | wsummerhill.github.io
11.0 parsecs away

Travel
| I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly.