Tutorials
Trying to learn Assembly for Reverse Engineering
Crack a simple program with GDB
Reverse Engineering challenges walkthrough
IOLI Crackmes
Crackmes.one
TryHackMe
picoCTF
HackTheBox
Others
Tutorials
Trying to learn Assembly for Reverse Engineering
Crack a simple program with GDB
Reverse Engineering challenges walkthrough
IOLI Crackmes
Crackmes.one
TryHackMe
picoCTF
HackTheBox
Others
99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?
As a SOC analyst, clients often request certain IPs to be blocked or whitelisted. However, dealing with a large JSON file that contains various information including the necessary IP addresses can be time-consuming. To overcome this challenge, a straightforward Python script can be used to extract IP addresses from the JSON format and export them…