A Python and a C implementation of Fermat's factorization method. Example of factoring prime numbers of a weak RSA public key.
A list of free digital forensics tools to analyze memory dumps, network captures or extract deleted files from storage devices.
A Quickstart guide to learn how to hook a function inside a remote process with Frida.
An extended list of the free software you might find in a reverse engineer toolbox.
Learn how to carry a Man-in-the-middle attack against the Diffie-Hellman key exhange with a Python script.
Learn how execute code before the entry point with the TLS callback trick and x86-64 assembly.
General review of the actual capacities of password cracking and drawbacks of passphrases.
Learn how to decompress, decrypt and restore the original content of a McAfee .BUP quarantine file.
Learn how to develop a Windows x86-64 Hello World program in assembly language Fasm the Flat Assembler.
Learn how to develop a very small shellcode able to read the content of a file on a Linux x86 system with NASM.
This XSS cheat sheet highlights the best tricks to bypass a Cross Site Scripting filter.
This XSS Keylogger tutorial demonstrates how an attacker can monitor a user keystrokes on a vulnerable web page.
Learn how to recover partial data and patterns from a file encrypted with AES in ECB mode.
Improve your reverse engineering and logical arithmetic skills with this cryptographically weak hash checking software.
How to recover a TrueCrypt password you partially know with mask attack or a password you forgot with brute-force.
Learn different ways to develop a file downloader for Windows in assembly language with Fasm the Flat Assembler.
This vulnerability makes it possible to modify the name and the extension of any file inside an archive.