Cybersecurity blog

Cybersecurity articles with security analysis and ethical hacking technics information

Linux process infection (part I)

Linux process infection (part I)

[...]

Read more
SaSSHimi: evading AllowTcpForwarding

SaSSHimi: evading AllowTcpForwarding

[...]

Read more
Arecibo: an OOB exfiltration tool (DNS & HTTP)

Arecibo: an OOB exfiltration tool (DNS & HTTP)

[...]

Read more
Interactive Shell via Bluetooth

Interactive Shell via Bluetooth

[...]

Read more
Pentests in restricted VDI environments

Pentests in restricted VDI environments

[...]

Read more
Exploiting Word: CVE-2017-11826

Exploiting Word: CVE-2017-11826

[...]

Read more
Fuzzing Tales 0x01: Yadifa DNS

Fuzzing Tales 0x01: Yadifa DNS

[...]

Read more
Protection against network privilege escalation

Protection against network privilege escalation

[...]

Read more
1 2 3 4