Explore >> Select a destination


You are here

blog.nuculabs.de
| | blog.nuculabs.dev
1.9 parsecs away

Travel
| | Hello, In this article I present you the solution to nice and short cracking challenge from Root-Me. After opening it up in Ghidra, I saw that the challenge is easy to solve, all you need is to find the password, which is in plain text. Basically just copy paste and you get the flag, but wait, there's a twist! I should have learned my lesson from the other challenge from Root-Me, which also had a twist.
| | blog.s1r1us.ninja
6.4 parsecs away

Travel
| | The BountyCon2020 CTF is sponsored by Facebook and top 20 people from APAC region will be invited to the invitation-only conference in Singapore. I solved all the challenges in the CTF and I really enjoyed playing it, and I am invited to the Conference.
| | www.thexero.co.uk
6.5 parsecs away

Travel
| | The first public exploit we released was for the Eudora Qualcomm IMAP server, commonly known as Worldmail. This exploit was classified as a Structured Exception Handler (SEH) buffer ...
| | www.forrestthewoods.com
14.2 parsecs away

Travel
| A step-by-step guide for debugging Rust with Visual Studio Code.