This won't be a long blog post, just a little pointer to an A/D CTF challenge that I created last year: A damn vulnerable web framework written in bash.
Have you ever been unsure about applying a certain network route, because you feared mis-routing or losing your own connection? Now there is a solution to this problem: routes-apply.sh
About two years ago I came across a .DS_Store file and wanted to extract its information (e.g. file names). After researching the file format and its security implications,
In this blogpost I'll share a small guide on how to automatically lock your screen when you remove your Yubikey. I have my Yubikey on my key ring, so whenever
I've recently started to look into basic application security concepts using the imho excellent material from OpenSecurityTraining.info. In this blogpost I'd like to share my first piece of shellcode