Explore >> Select a destination


You are here

www.elttam.com
| | blog.pkh.me
17.6 parsecs away

Travel
| | It's been a very long time since I've done some actual reverse engineering work. Going through a difficult period currently, I needed to take a break from the graphics world and go back to the roots: understanding obscure or elementary tech stuff. One may argue that it was most certainly not the best way to deal with a burnout, but apparently that was what I needed at that moment. Put on your black hoodie and follow me, it's gonna be fun. The beginning and the start of the end So I started solving a few ...
| | www.modzero.ch
15.2 parsecs away

Travel
| | [AI summary] This advisory details critical vulnerabilities in Cisco IP phones' web interfaces that allow remote attackers to gain full control of the devices without authentication. The vulnerabilities include buffer overflow, path traversal, and CSRF weaknesses, which can be exploited to install backdoors, exfiltrate data, and use the phones as attack vectors.
| | taeluralexis.com
17.2 parsecs away

Travel
| | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies.
| | cocomelonc.github.io
34.1 parsecs away

Travel
| [AI summary] A technical deep dive into an early bird APC injection technique, complete with source code and payload execution examples, intended for both offensive and defensive cybersecurity education.