Skip to content
  • Main
  • Content
  • int21h
  • About

MOV AX, BX

Code depilation salon: Articles, Code samples, Processor code documentation, Low-level programming, Working with debuggers

  • Story Behind Sweet SSRF. Story Behind Sweet SSRF.
  • The Secret Parameter, LFR, and Potential RCE in NodeJS Apps The Secret Parameter, LFR, and Potential RCE in NodeJS Apps
  • Exploiting CVE-2014-3153 (Towelroot) Exploiting CVE-2014-3153 (Towelroot)
  • FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities
  • NTFS Remote Code Execution (CVE-2020-17096) Analysis NTFS Remote Code Execution (CVE-2020-17096) Analysis

Автор: admin

Escalating XSS to Account Takeover

Posted on 30.11.202030.11.2020 / by admin /
Escalating XSS to Account Takeover

Escalating XSS to Account Takeover
#xss #web #security

Posted in security, web, xss Tagged security, web, XSS Leave a Comment on Escalating XSS to Account Takeover

Weaponizing XSS For Fun & Profit

Posted on 30.11.202030.11.2020 / by admin /
Weaponizing XSS For Fun & Profit

Weaponizing XSS For Fun & Profit
#web #security #xss

Posted in security, web Tagged security, web Leave a Comment on Weaponizing XSS For Fun & Profit

Burp Suite vs OWASP ZAP – a Comparison series

Posted on 27.11.202027.11.2020 / by admin /
Burp Suite vs OWASP ZAP – a Comparison series

Burp Suite vs OWASP ZAP – a Comparison series
#burp #burppro #suite #owasp #zap #zap-a

Posted in tool, web Tagged tools, web Leave a Comment on Burp Suite vs OWASP ZAP – a Comparison series

Genetic Analysis of CryptoWall Ransomware

Posted on 27.11.202027.11.2020 / by admin /
Genetic Analysis of CryptoWall Ransomware

Genetic Analysis of CryptoWall Ransomware
#Genetic #Analysis #CryptoWall #Ransomware #malware

Posted in crypt, encrypted, malware, malware analysis, ransomware Tagged crypt, crypter, Cryptography, Malware, malware analysis Leave a Comment on Genetic Analysis of CryptoWall Ransomware

Coldcard isolation bypass

Posted on 27.11.202027.11.2020 / by admin /
Coldcard isolation bypass

Coldcard isolation bypass
#Coldcard #isolation #bypass #attack #Litecoin #Testnet #Bitcoins, #Bitcoin #Cash

Posted in bitcoin, exploit, hardware Tagged bitcoin, exploit, hardware Leave a Comment on Coldcard isolation bypass

AMD laptops have a hidden 10-second performance delay. Here’s why

Posted on 27.11.202027.11.2020 / by admin /
AMD laptops have a hidden 10-second performance delay. Here’s why

AMD laptops have a hidden 10-second performance delay. Here’s why #amd

Posted in amd Tagged AMD Leave a Comment on AMD laptops have a hidden 10-second performance delay. Here’s why

Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!

Posted on 24.11.202024.11.2020 / by admin /
Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!

Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!
#bcrypt #crypt #fpga

Posted in crypt, fpga Tagged bcrypt, crypt, fpga Leave a Comment on Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs!

The Powerful HTTP Request Smuggling

Posted on 24.11.202024.11.2020 / by admin /
The Powerful HTTP Request Smuggling

The Powerful HTTP Request Smuggling
#http #https #security #smuggling

Posted in HTTP, HTTPS, security Tagged http, https, security, smuggling Leave a Comment on The Powerful HTTP Request Smuggling

Deep Dive Into Nmap Scan Techniques

Posted on 24.11.202024.11.2020 / by admin /
Deep Dive Into Nmap Scan Techniques

Deep Dive Into Nmap Scan Techniques
#nmap #security #tool

Posted in security, tool Tagged nmap, security, tool, tools Leave a Comment on Deep Dive Into Nmap Scan Techniques

Exploring the Exploitability of “Bad Neighbor”: The Recent ICMPv6 Vulnerability (CVE-2020-16898)

Posted on 14.11.202014.11.2020 / by admin /
Exploring the Exploitability of “Bad Neighbor”: The Recent ICMPv6 Vulnerability (CVE-2020-16898)

Exploring the Exploitability of “Bad Neighbor”: The Recent ICMPv6 Vulnerability (CVE-2020-16898)
#Exploit #poc #windows #security #icmp

Posted in exploit, PoC, security, windows Tagged exploit, icmp, poc, Windows Leave a Comment on Exploring the Exploitability of “Bad Neighbor”: The Recent ICMPv6 Vulnerability (CVE-2020-16898)

Навигация по записям

Предыдущие записи
Следующие записи

What is up

Articles by date

  • Январь 2021 (5)
  • Декабрь 2020 (4)
  • Ноябрь 2020 (19)
  • Октябрь 2020 (16)
  • Сентябрь 2020 (1)
  • Август 2020 (2)
  • Июль 2020 (3)
  • Июнь 2020 (3)
  • Май 2020 (6)
  • Февраль 2020 (2)
  • Январь 2020 (1)
  • Декабрь 2019 (6)
  • Октябрь 2019 (2)
  • Июнь 2019 (4)
  • Апрель 2019 (4)
  • Март 2019 (4)
  • Февраль 2019 (28)
  • Январь 2019 (5)
  • Декабрь 2018 (30)
  • Ноябрь 2018 (62)
  • Октябрь 2018 (44)
  • Сентябрь 2018 (12)
  • Июль 2018 (8)
  • Июнь 2018 (21)
  • Май 2018 (10)
  • Апрель 2018 (32)
  • Февраль 2018 (12)
  • Январь 2018 (7)
  • Январь 2017 (2)
  • Декабрь 2016 (44)

FRESH Articles

  • Story Behind Sweet SSRF. 25.01.2021
  • The Secret Parameter, LFR, and Potential RCE in NodeJS Apps 25.01.2021
  • Exploiting CVE-2014-3153 (Towelroot) 21.01.2021
  • FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities 20.01.2021
  • NTFS Remote Code Execution (CVE-2020-17096) Analysis 07.01.2021
  • Speeding up Linux disk encryption 27.12.2020
  • Oh, so you have an antivirus… name every bug 27.12.2020
  • Dumping LAPS Passwords from Linux 21.12.2020
  • How I hacked Facebook: Part One 13.12.2020
  • Threat Actor: Unkown 30.11.2020
  • Escalating XSS to Account Takeover 30.11.2020
  • Weaponizing XSS For Fun & Profit 30.11.2020
  • Burp Suite vs OWASP ZAP – a Comparison series 27.11.2020
  • Genetic Analysis of CryptoWall Ransomware 27.11.2020
  • Coldcard isolation bypass 27.11.2020
  • AMD laptops have a hidden 10-second performance delay. Here’s why 27.11.2020
  • Bcrypt password cracking extremely slow? Not if you are using hundreds of FPGAs! 24.11.2020
  • The Powerful HTTP Request Smuggling 24.11.2020
  • Deep Dive Into Nmap Scan Techniques 24.11.2020
  • Exploring the Exploitability of “Bad Neighbor”: The Recent ICMPv6 Vulnerability (CVE-2020-16898) 14.11.2020

Meta rss

  • Регистрация
  • Войти
  • Лента записей
  • Лента комментариев
  • WordPress.org

About us

twitter:
OxFemale
defconmoscow
2600ru
Sites:
Defcon Moscow
2600 Moscow

mov ax, bx
or ax, bx
ret

 

Our friends

Our friends
twitter:
DC7499
Moscow2600
Sites:
Defcon Moscow
2600 Moscow

Meta

  • Регистрация
  • Войти
  • Лента записей
  • Лента комментариев
  • WordPress.org
Powered by WordPress

All rights reserved © MOV AX, BX Music and Video Theme by Seos Themes