Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

Adventures in Hooking Process and Thread Spawn Events

Penetration TestingWeb Application Security

Obviously with BASIC authentication the user is going to be asked for their credentials.

A tool to find Windows registry files in a blob of data

Whether it be linking a user to knowledge of a file, as part of a jump list, or in their use for malicious purposes.

As you would expect, office printers are often identified when conducting a penetration test of an office network.

And through a series of circumstances, I ended up taking on the task.

Luckily the first application I chose was a treasure trove of bugs, so that kept me busy for a while.

This short article is a collection of links to Windows and Microsoft code, and a story about it.

View previous queries