|
You are here |
blog.nuculabs.dev | ||
| | | | |
mouha.be
|
|
| | | | | ||
| | | | |
blog.nuculabs.de
|
|
| | | | | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character | |
| | | | |
blog.redcrowlab.com
|
|
| | | | | I found a Jailbroken version of the recent Llama 3.1 Instruct model and decided to see how it would do at some basic exploit development tasks, if I would get any refusals, etc. I am using LM Studio as my chat wrapper to the model. I used a very | |
| | | | |
snyk.io
|
|
| | | Learn more about wimpyprogrammer/regex-to-strings vulnerabilities. No vulnerabilities found in undefined. View the full report. | ||