|
Antivirus runtime bypass
|
|
12
|
1518
|
October 26, 2025
|
|
The "quick way" to learn about Pascal Programming Language
|
|
3
|
264
|
October 26, 2025
|
|
Binary Armory Wiki
|
|
4
|
525
|
October 26, 2025
|
|
How do you learn WinApi
|
|
6
|
633
|
October 26, 2025
|
|
I want to be a hacker ,coder but my parents are against it
|
|
34
|
3894
|
October 26, 2025
|
|
Why is post quantum cryptography important
|
|
1
|
286
|
October 26, 2025
|
|
Need advise on dynamic reversing encrypted php file
|
|
4
|
633
|
October 26, 2025
|
|
Best language for write malware
|
|
12
|
2164
|
October 26, 2025
|
|
Obfuscated PHP Backdoor
|
|
4
|
1536
|
October 26, 2025
|
|
Can Responder take down infrastructure?
|
|
0
|
301
|
April 16, 2021
|
|
Some books that you would recommend reading
|
|
4
|
522
|
October 26, 2025
|
|
Phishing Guides for Pentesters?
|
|
9
|
2702
|
October 26, 2025
|
|
Programming for Wanabes VII. Finding files I
|
|
6
|
623
|
October 26, 2025
|
|
0x00sec Wallpapers - 4K
|
|
7
|
5237
|
October 26, 2025
|
|
Multi Platform Execution
|
|
2
|
442
|
October 26, 2025
|
|
Kali vs BlackArch vs Parrot Sec
|
|
10
|
1647
|
April 14, 2021
|
|
Can someone explain a function that return an array in c
|
|
3
|
627
|
October 26, 2025
|
|
Programming for Wannabes Part VI. Malware Introduction
|
|
3
|
1114
|
October 26, 2025
|
|
How does malware utilize tor?
|
|
4
|
1729
|
October 26, 2025
|
|
Too Late Hacking
|
|
26
|
4451
|
April 10, 2021
|
|
Heap Exploitation | Playing with chunks!
|
|
7
|
9246
|
April 9, 2021
|
|
Found a great job pen testing, what skills do I need?
|
|
1
|
871
|
April 11, 2021
|
|
VMs on 4GB RAM PC
|
|
3
|
1321
|
October 26, 2025
|
|
Why ECB is not a good mode of operation
|
|
3
|
1406
|
October 26, 2025
|
|
Threat Hunting and Mitigation in *Nix/macOS Environments. (Please comment and tell me what I'm missing. This is initial work)
|
|
1
|
1510
|
October 26, 2025
|
|
Using search engines for fun and bounties
|
|
7
|
8425
|
March 31, 2021
|
|
How do you obfuscate a payload
|
|
1
|
1171
|
October 26, 2025
|
|
What is best methodology for discovery vulnerability and Exploit Development in binary software?
|
|
2
|
1475
|
March 31, 2021
|
|
Why the most skilled people in this field thinks that our world is a simulation?
|
|
3
|
1398
|
October 26, 2025
|
|
Prerequisites related to RE and malware analysis
|
|
3
|
1519
|
March 27, 2021
|