Intro
Hi, after some time, I write again a small WriteUp. Today it's about the CTF "Keeper". This CTF-Challenge can be found at the platform HackTheBox. You have to find 2 flags in this challenge.
Hi, after some time, I write again a small WriteUp. Today it's about the CTF "Keeper". This CTF-Challenge can be found at the platform HackTheBox. You have to find 2 flags in this challenge.
Hi, after some time, I write again a small WriteUp. Today it's about the CTF "Expose". This CTF-Challenge can be found at the platform TryHackMe. You have to find 2 flags in this challenge. Here to simply create an account, and off you go 😄
Hi, I had recently written a post on the topic of Windows PE32 exploitation. I had no DEP active at that time, as it is the standard case with Windows.
Hi, I thought I would do something on the topic of Windows Exploitation. I have done a lot on Linux in the past. Windows is also interesting times, why what write about it.
Hi, I thought since I feel like getting into metasploit module development I would do a little howto.
Hi, after the CTF I thought I'd do another one. The CTF I'm doing a WriteUp on now is Sikly CTF-1. I have deliberately chosen this CTF, because this is also a CTF-VM, which is also used in the OSCP in one of the labs.