Damn Vulnerable Bash Web Server
This won't be a long blog post, just a little pointer to an A/D CTF challenge that I created last year: A damn vulnerable web framework written
This won't be a long blog post, just a little pointer to an A/D CTF challenge that I created last year: A damn vulnerable web framework written
Have you ever been unsure about applying a certain network route, because you feared mis-routing or losing your own connection? Now there is a solution to this problem: routes-apply.sh
About two years ago I came across a .DS_Store file and wanted to extract its information (e.g. file names). After researching the file format and its security implications,
In this blogpost I'll share a small guide on how to automatically lock your screen when you remove your Yubikey. I have my Yubikey on my key ring,
I've recently started to look into basic application security concepts using the imho excellent material from OpenSecurityTraining.info [http://opensecuritytraining.info/Exploits1.html]. In this blogpost I'