Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

But it’s a perfect...

DNSAPI.DLL Read more… PEB: Where Magic Is Stored As a reverse engineer, every now and then you encounter a situation where you dive de…

Meelo An infosec guy who's constantly seeking for knowledge.

Intro On a recent project, I was tasked with the usual goal: Start from the ground and find a way to take over the company - in the end, if possible,…

As you may have read in my about page, I am OSCP and OSCE.

Experiencing a full range of emotions, including excitement, aggravation, joy, and satisfaction, has shown to be quite beneficial in improving my gen…

But in this world of automation the time it takes for you to respond may be so long that its unlikely you can respond in time.

To date, we've reviewed techniques such as shellcode loading and encryption, circumventing detection, and building in our own syscalls.

The purpose is to have standardize reporting so that everyone would use the same definitions when writing and talking about malware.

View previous queries