Find your internet twin!

This site is currently broken for new queries. It seems like some bot hit it and we ran out of exa credits.

Enter your personal website to find others like you. Powered by Exa's "find similar". Built on Val Town.

Similar Sites:

As you may have read in my about page, I am OSCP and OSCE.

Posts LFI to RCE via access_log injection on February 21, 2021 tutorial + 18 SQL injection with load file and into outfile on February 21, 20…

The main reason I decided to write up my experience with it is the fact that it instantly

Explaining Stack5 from ProtoStart series on ARM (azeria-labs) .

Today I’m taking a look at different packers used to pack malware, how to identify them and how to unpack them.

I didn’t manage to solve two of them, but I will briefly give my thoughts on them.

One-time passwords are much more likely to be guessed than you think.

These systems are in fact used every day as public transport passes, as security token in access control systems or as a digital “bar code” in shops.

If you are lucky and convenient classes exist on the target and you have knowledge of them you might get away with simply constructing one of them.

View previous queries