Explore >> Select a destination


You are here

blog.s1r1us.ninja
| | blog.nuculabs.de
6.4 parsecs away

Travel
| | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character
| | rog3rsm1th.github.io
5.0 parsecs away

Travel
| | Some cool techniques you can use to create SROP exploits
| | blog.darkwolfsolutions.com
3.1 parsecs away

Travel
| | September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless
| | faraz.faith
34.1 parsecs away

Travel
|