honeypots Operating honeypots Operating honeypots and monitoring them using the grafana worldmap plugin.
ctf Hack around the clock: Introduction to Blind Attacks A small example of a blind timing attack, based on a challenge from Junior 35C3CTF
ctf 35c3 Stringmaster2 Walkthrough This is my Walkthrough for the stringmaster2 challenge, which I solved during the 35c3 juniors CTF. I'm trying to explain the bug and the exploitation techniques I used in a very detailed way,
Optimizing the simulation of galaxies using Barnes-Hut simulations Simulating galaxies in really fast way, sounds complicated? It is, but let's try understanding how it works!
ctf RITSEC CTF writeup - recover AES-CBC IV This is a writeup for the crypto challenge "Who draw on my program?" from RITSEC CTF 2018. The flag is the initialisation vector - © sandw1ch RITSECFoundations WTF is CTF? If you have no
hacking The Theory Of Disclosure Participating in the field of IT security exposes you to the chance that you stumble upon services, software or hardware which you may find vulnerable. Either the logic of the objective is broken
blog.init(); Hello! When hosting a blog for yourself, you are often confronted with the problem of readers demanding fresh, new and interesting content on a recurring base. And, of course, it's nice to have