Explore >> Select a destination


You are here

blog.nuculabs.dev
| | mouha.be
3.0 parsecs away

Travel
| |
| | blog.nuculabs.de
1.9 parsecs away

Travel
| | Hello, Here are my write-ups for the X-MAS CTF 2019 organized by . Reversing: Santa's crackme Santa's crackme is easy to solve when using Ghidra, all you need to do is open up the binary, read the code and use the XOR Memory script from Ghidra. The flag is retrieved from flag_matrix and xored by 3. Select the flag data, right click on Script Manager and execute the XorMemory script We get the flag, except for the first character
| | blog.redcrowlab.com
5.0 parsecs away

Travel
| | I found a Jailbroken version of the recent Llama 3.1 Instruct model and decided to see how it would do at some basic exploit development tasks, if I would get any refusals, etc. I am using LM Studio as my chat wrapper to the model. I used a very
| | snyk.io
34.0 parsecs away

Travel
| Learn more about wimpyprogrammer/regex-to-strings vulnerabilities. No vulnerabilities found in undefined. View the full report.