unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Flare-On 12: NTFSM - Solving a Finite State Machine with Binary Ninja
As the dust settles on this year’s Flare-On challenge, I finally found some time time to sit down an...
2025-11-13 00:0:0 | 阅读: 2 |
收藏
|
Jack Hacks - jhalon.github.io
transitions
ntfsm
140ff1640
temp1
temp0
So You Want To Work in Cyber Security?
It goes without saying that being a Professional Penetration Tester is considered to be one of the “...
2025-1-26 00:0:0 | 阅读: 4 |
收藏
|
Jack Hacks - jhalon.github.io
security
network
reverse
Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463
Welcome to the third and final installment of the “Chrome Browser Exploitation” series. The main obj...
2022-12-29 08:0:0 | 阅读: 11 |
收藏
|
Jack Hacks - jhalon.github.io
memory
d8
vuln
arraybuffer
confusion
Chrome Browser Exploitation, Part 2: Introduction to Ignition, Sparkplug and JIT Compilation via TurboFan
In my previous post “Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internal...
2022-11-16 08:0:0 | 阅读: 4 |
收藏
|
Jack Hacks - jhalon.github.io
bytecode
turbofan
sparkplug
interpreter
ignition
Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals
Web browsers, our extensive gateway to the internet. Browsers today play a vital role in modern orga...
2022-10-22 08:0:0 | 阅读: 4 |
收藏
|
Jack Hacks - jhalon.github.io
memory
transition
hiddenclass
shape
chrome
Red Team Tactics: Utilizing Syscalls in C# - Writing The Code
In my previous post “Red Team Tactics: Utilizing Syscalls in C# - Prerequisite Knowledge”, we covere...
2020-4-16 08:0:0 | 阅读: 2 |
收藏
|
Jack Hacks - jhalon.github.io
delegate
memory
unmanaged
utilize
Red Team Tactics: Utilizing Syscalls in C# - Prerequisite Knowledge
Over the past year, the security community - specifically Red Team Operators and Blue Team Defenders...
2020-4-14 08:0:0 | 阅读: 1 |
收藏
|
Jack Hacks - jhalon.github.io
memory
unmanaged
windows
delegates
hwnd
SANS 2019 Holiday Hack Challenge
Happy Holidays and a Happy New Year 2020 readers!Thanks for joining me today as we go over the SANS...
2020-1-23 08:0:0 | 阅读: 1 |
收藏
|
Jack Hacks - jhalon.github.io
elfu
hh
i32
sleigh
santa
Offensive Security’s CTP & OSCE Review
On August 22, 2019 I received yet another one of the most desired emails by aspiring Offensive Secur...
2019-8-22 08:0:0 | 阅读: 1 |
收藏
|
Jack Hacks - jhalon.github.io
osce
shellcode
ctp
security
oscp
Google CTF (2018): Beginners Quest - PWN Solutions (2/2)
In my previous post “Google CTF (2018): Beginners Quest - PWN Solutions (1/2)”, we covered the first...
2019-3-1 08:0:0 | 阅读: 4 |
收藏
|
Jack Hacks - jhalon.github.io
motd
poetry
nogroup
todos
fridge
Google CTF (2018): Beginners Quest - PWN Solutions (1/2)
In my previous post “Google CTF (2018): Beginners Quest - Reverse Engineering Solutions”, we covered...
2019-2-22 08:0:0 | 阅读: 1 |
收藏
|
Jack Hacks - jhalon.github.io
nogroup
quit
1337
memory
Google CTF (2018): Beginners Quest - Reverse Engineering Solutions
In my previous post “Google CTF (2018): Beginners Quest - Web Solutions” we covered the web challeng...
2019-2-21 08:0:0 | 阅读: 3 |
收藏
|
Jack Hacks - jhalon.github.io
reverse
firmware
username
ext4
memory
Previous
1
2
3
4
5
6
7
8
Next