Intro to Reverse Engineering
Reverse Engineering is a tedious process, but just like everything else, it's rewarding in a special way. Before getting into...
Reverse Engineering is a tedious process, but just like everything else, it's rewarding in a special way. Before getting into...
In Linux systems, the executable files are known as executable and linkable format (ELF).
Let's read the information of an...
The assembly language is one of the most ancient and insane languages that our computers have to deal with. Actually,...
Another great con that from now on will further stay virtually accessible. Amazing!
Gray Hat is a conference...
Transactions are the essential part in a crypto system. They are the public entries in the blockchain. In the bitcoin...
By escalating the privileges inside a system the attackers gain access to resources which allows them to misuse them in...
Here you will find lists of events and CTFs oriented towards hacking. https://infocon.org/cons/ is an updated archive with all known...
Here are some Red Team's Village CTFs writeups from DC and GH that took place in 2020. The full...