Exploit Spectre V1 (CVE-2017-5753) Introduction DISCLAIMER: This post is strictly for educational purposes. Use at your own risk. With the new Spectre and Meltdown vulnerabilities discovered recently, let's look at Spectre V1 which was
Exploit FLUSH + RELOAD , A Low noise L3 Cache side Channel If you are wondering whether you can exploit a system which doesn't have any software vulnerabilities just by using hardwares or if you find using hardware to extract the private
Misc Hacking Vending machine! The machine that gives you free food. I have seen some video's out there, where people enter a predefined "code" and they would get the items for free, So one hungry night,I thought to
Game Hacking Hack Slash Loot trainer. Hack, Slash, Loot(HSL) is a single-player turn-based dungeon crawler for Windows, MacOS, and Linux. Take control of a lone hero and explore sprawling dungeons, fight dangerous monsters, and most
HID keyboard BadMouse: The Mouse clicks, while the Duck quacks! Before we dive into the post lets look at a demo of what this is all about. Yes, that just happened! I just plugged in the "supposedly" unharmful
Shellcode Linux x86 One-Way Shellcode. (Socket Reuse) In this post we will look at an elegant and a simple technique to get our shell past the firewall. Recently while working on a pentest I was up against
web Simple Windows PHP reverse shell If you are here , it's most probably that you have tired other reverse shell script for windows and have failed , I made this Handy Windows reverse shell in PHP while
Pentest Introduction to Manual Backdooring Introduction DISCLAIMER: This post is strictly for educational purposes. Use at your own risk. In the last post we saw how we can reduce the detection ratio by evading most
Pentest Creating a Custom shellcode encoder Why do we need an custom shellcode encoder/decoder ? When it is easy to encode our shellcode by using encoders from Metasploit such as the XORmencoder, shikata_ga_nai, etc.