You are here |
tcode2k16.github.io | ||
| | | |
taeluralexis.com
|
|
| | | | We'll target a network comprising 3 machines, leveraging CVE exploits, pivoting, code obfuscation techniques, and AV bypass strategies. | |
| | | |
blog.nuculabs.de
|
|
| | | | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character | |
| | | |
pyimagesearch.com
|
|
| | | | In today's tutorial you'll learn how to build a scalable deep learning REST API using Keras, Flask, Redis, and message queuing/message brokers. | |
| | | |
securitydone.com
|
|
| | U.S. Charges 7 Chinese Nationals in Major 14-Year Cyber Espionage Operation |