This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.
Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.
Adventures in Hooking Process and Thread Spawn Events
Penetration TestingWeb Application Security
Obviously with BASIC authentication the user is going to be asked for their credentials.
A tool to find Windows registry files in a blob of data
Whether it be linking a user to knowledge of a file, as part of a jump list, or in their use for malicious purposes.
As you would expect, office printers are often identified when conducting a penetration test of an office network.
And through a series of circumstances, I ended up taking on the task.
Luckily the first application I chose was a treasure trove of bugs, so that kept me busy for a while.
This short article is a collection of links to Windows and Microsoft code, and a story about it.