Background Having a disuccsion with a friend about termbin and that the only viable improvement to the system would most probably be in/out encryption, (src hosted at github). Enter me, a bored...
From dirty Tor exit nodes to Bitcoin wallet.dat theft
Background While living at a halfway house, otherwise bored of being sober at the time, I decided I was going to run a Tor exit node. The neat thing about Tor exit nodes is, if you are an operat...
Password cracking wordlists
Background I’ve compiled a list of my favorite cracking wordlists of different sizes and types. These lists are designed to be used with john/thc-hydra/aircrack-ng/oclhashcat and more. One passwor...
CVE-2017-5816 Whitepaper
Background The dbman.exe module out of HP iMC PLAT 7.3 listening on TCP/2810 tries to initiate a restart of some network services, whilst doing so running NET STOP on an asn.1 BER encoded ip addr...
CVE-2006-3392 Whitepaper
Background Webmin contains two critical vulnerabilities within the perl codebase. The first, a directory transversal where you can read arbitrary files, including webmin’s logs. The second vulne...