Explore >> Select a destination


You are here

cocomelonc.github.io
| | niemczuk.tech
3.7 parsecs away

Travel
| | Everyone should be familiar with the concept of brute forcing. In short it is an action of trying every possible combination till succeeding. Most often used in password hacking / hash guessing.
| | mdanilor.github.io
4.2 parsecs away

Travel
| | A beginers guide into a Windows kernel stack overflow vulnerability.
| | bohops.com
3.3 parsecs away

Travel
| | Introduction Process Injection is a popular technique used by Red Teams and threat actors for defense evasion, privilege escalation, and other interesting use cases. At the time of this publishing, MITRE ATT&CK includes 12 (remote) process injection sub-techniques. Of course, there are numerous other examples as well as various and sundry derivatives. Recently, I was...
| | eddiejackson.net
18.8 parsecs away

Travel
| [AI summary] The blog post explains how to encode and decode text files, executables, and images using Base64 in PowerShell, with code examples for various tasks.