PinnedPublished inSystem WeaknessExploiting IKE Hosts with Weak Pre‑Shared KeysHow to extract weak pre‑shared keys from a public IKE host for offline crackingSep 27Sep 27
PinnedPublished inCodeXStarting with Go? Here Are 5 Things You’ll Be Glad to KnowA collection of five Go concepts to support your journeySep 10Sep 10
PinnedPublished inSystem WeaknessLogin Brute Force With Selenium #2A collection of additional techniques for browser automation with SeleniumAug 28Aug 28
PinnedPublished inSystem WeaknessPython Sandbox EvasionA collection of techniques for bypassing common filters in a Python sandboxAug 1Aug 1
PinnedPrivilege Escalation With fail2banA quick start guide for privilege escalation with fail2banApr 15Apr 15
THM - Lost in RAMslationA writeup for “Lost in RAMslation” on TryHackMeNov 1A response icon1Nov 1A response icon1
THM - XDR: Operation Global Dagger 2A writeup for “XDR: Operation Global Dagger 2” on TryHackMeOct 5Oct 5
THM - XDR: Operation Global DaggerA writeup for “XDR: Operation Global Dagger” on TryHackMeOct 5Oct 5