- 27 Sep 2022 Writing Small (Reverse) Shellcode
- 21 Jun 2022 Shared section code execution
- 10 Jun 2022 Obfuscating shellcode entropy
- 08 Jul 2018 Solving CTF challenges with DLL injection
- 17 Oct 2017 A watering hole with Windows binaries
- 03 Aug 2017 Application whitelist bypass using XLL and embedded shellcode
- 21 Nov 2016 Creating a multiport man-in-the-middle network tap
- 09 Jun 2016 Hack in the Box 2016 - MISC400 Writeup (Part 1)
- 12 Jan 2016 Synology NAS DSM 5.2 Remote Code Execution (RCE)
- 05 May 2015 How to add an XSS-able bot to your CTF
- 30 Apr 2015 Hack in the box teaser 2015 : Forensics 1000
- 11 Feb 2014 The hash that never was
- 31 Jan 2014 The friendly phisherman
- 09 Sep 2013 Using XSS to CSRF
- 26 Aug 2013 Stealing cookies with SQL
- 21 Aug 2013 The backdoor you didn't grep
- 19 Aug 2013 Why come inside, if I can stand out front?
- 17 Jun 2013 Malware – The game of cat and mouse
- 11 Jun 2013 Sniffing out Phishing
- 06 Jun 2013 The XSS who watched me
- 05 Jun 2013 I found an LFI, now what?