Solving MalwareTech’s Strings challenges with Binary Ninja.
MalwareTech’s string challenges are so easy that everyone can do them. I’m writing this article in order to help those who struggle with them, but of course ...
MalwareTech’s string challenges are so easy that everyone can do them. I’m writing this article in order to help those who struggle with them, but of course ...
I wanted to explore the magic of RFID and I bought a simple card reader from Banggood which allows me to read and write 13.56MHz cards. The reader comes with...
I decided that I want to do something new and I started to get into assembly and reverse engineering, hopefully I can build a career with this. I watched so...
In this short article I will try to introduce you to the Tor Project and what can you do in order to help it. What is the Tor project? The EFF describes th...
I’ve been working on a website for some time now, at first I’ve made it with Django + templates and now I use Django Rest Framework and Angular. The website ...
Introduction If you know what a Yubikey is, you may skip this section. Yubikey is quite expensive device that acts as a portable GPG key, it is considered ...
Photo by Tyler Milligan on Unsplash Hello, In this short article I will try to explain what is an HTTP interceptor and how to use it. My article is based o...
My Raspberry, serving as an OpenVPN server Hello everyone! In this short article I will explain how to setup your own VPN (Virtual Private Network) server...
Cover Photo by Matan Segev from PexelsCover Recently, I purchased a NodeMCU from AliExpress for about $4. The reason I did this was to find out what all the ...