Blog

📖
Blog
Shift
Non-Technical
🤫
Always Be Self-Criticizing
Technical
AI
🤖
Threat Hunting with Elastic MCP
Technical
DFIR
🕵🏼
Xintra: Assassin Kitty
DFIR
Technical
CTF
Xintra: VirusViper
Xintra: VirusViper
Technical
CTF
DFIR
🥷🏼
LummaStealer
Technical
Windows
Reverse Engineering
📂
IE DCOM to LFI
Technical
Windows
💦
NTLMv2 leaking in Web Applications
Technical
Windows
🥐
Book Review: Practical Vulnerability Management
Book Summary
Book Review
🔥
Firefox Security
Technical
Reverse Engineering
🐝
PHP Censor v2.1.4 CVE-2024-34914
CVE
🐝
WP Plugin Bug CVE-2024-4873
CVE
🐝
HTMLy v2.9.6 CVE-2024-34191
CVE
🐝
CVE-2024-2047
CVE
🐝
CVE-2024-2948
CVE
🌩️
Azure Access Tokens
Technical
Cloud
🫀
Healthy and Wealthy
Non-Technical
📙
Books that changed my thinking
Non-Technical
👤
Whoami
Non-Technical
♟️
pwnable.tw - Start
CTF
Technical
pwn
Agent Tesla
Malware
Reverse Engineering
Technical
🦆
QakBot Hooking Analysis
Technical
Malware
Reverse Engineering
🤖
Custom Sample Analysis
Technical
Malware
Reverse Engineering
🚷
Anti-Analysis in Malware
Technical
Reverse Engineering
Malware
💉
Process Injection
Technical
Malware
Reverse Engineering
👜
Malware Delivery (Part 2)
Technical
Malware
Reverse Engineering
👜
Malware Delivery (Part 1)
Technical
Malware
Reverse Engineering
👃🏼
Ursnif Analysis
Technical
Reverse Engineering
Malware
📏
Malware Algorithms
Technical
Reverse Engineering
Malware
✍🏼
Creating a Language: Lexer
Technical
Languages
📶
Determining Protocols based on Network Packets
Technical
Networking
💬
New Place
Non-Technical
🐼
PandaBanker
Technical
Reverse Engineering
Malware
Stinky the Lonely Dolphin
Non-Technical