Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

This meant any attempts to...

🎃 Spooky (forthcoming) OpenSSL 3 critical vuln, RC4 fun (@tiraniddo), Autodial DLL techniques (@TheXC3LL), token leak abuse via webshell (@_Kudaes…

And through a series of circumstances, I ended up taking on the task.

The postings on this site are my own and don't represent my employer

As you would expect, office printers are often identified when conducting a penetration test of an office network.

4 useful ways to fuzz stuff that many people would consider 'unfuzzable'.

When I was in high school, operating systems and compilers were two concepts that I tried to understand but couldn’t completely get a grasp of just f…

Posts LFI to RCE via access_log injection on February 21, 2021 tutorial + 18 SQL injection with load file and into outfile on February 21, 20…

I ended up submitting a detailed description of manual exploitation to the vendor, and I thought it might be interesting to share here.

View previous queries