The Void 🌌
Search
Search
Dark mode
Light mode
Explorer
📁 Blog
📄 Backdooring Portable Executables (PE)
📄 Conquering Goliath as a CCDC Blue Teamer
📄 Downsizing My Home Lab
📄 EggHunter x86_64
📄 Exploit Exercise Protostar Stack Series
📄 Hardware Hacking CTF - HackIN
📄 How to Setup Logitech MX Master Mouse with Linux
📄 HTB Dante Pro Lab and THM Throwback AD Lab
📄 My HomeLab
📄 NCL Exploitation Root Cause Write Up
📄 No More Network Bottlenecks
📄 Pivoting with Chisel
📄 Processing Ideas and Taking Smart Notes
📄 Productive Applications and Tools
📄 Proxmox VM Creation Script for Quick Pentest Lab
📄 Refined Home Lab Network
📄 Unmasking Secrets - Deciphering Encrypted Passwords through Reverse Engineering
📄 Working on Remote Projects with Visual Studio Code
📁 Content
📄 API Hashing
📄 API Hooking
📄 Backdooring Portable Executable
📄 Beacon Object Files
📄 Certification Review and Prep
📄 CIA DOs and DONTs
📄 Clearing Command History
📄 Code Signing Certificate Spoofing
📄 Coerce Forced Authentication
📄 COM Hijacking
📄 Command and Control (C2) Infrastructure Design
📄 Command Line Spoofing
📄 Common Password List
📄 Create Account for Persistence
📄 Creating a Phishing Pre-Text
📄 Cross Site Request Forgery (CSRF)
📄 Custom DMA Firmware
📄 Cyber Crime Forums
📄 Dark Net Markets
📄 DHCPv6 Spoofing (IPv6)
📄 Disable or Modify Firewall, EDR, or AV
📄 DLL Side Loading
📄 DNS Records
📄 DOM XSS
📄 Domain Categorization Review
📄 Domain Information
📄 Dumping Credentials
📄 Dynamic Analysis
📄 Elevators and Keys
📄 Email Phishing
📄 Event Tracing for Windows (ETW)
📄 Exploit Development Resources
📄 External Password Spraying
📄 FCC ID
📄 General Hacking Resources
📄 Getting CVE's
📄 Hacker Blogs
📄 Hiding Socket Connections
📄 How to Install Ghidra on Ubuntu 19.10
📄 HTML Smuggling
📄 Identify the Domain
📄 Identifying Email Accounts
📄 Information Security Salaries
📄 Internal Password Spraying
📄 IO Request Packet (IRP)
📄 IP Address Search Engines
📄 Kernel Patch Protection (KPP)
📄 Legacy Instructions
📄 Linux Backdoor Techniques
📄 LLMNR NBT-NS Poisoning
📄 LMK Modification
📄 Loading and Running a Kernel Driver
📄 Local Administrator Password Solution (LAPS)
📄 Local File Inclusion
📄 Malware Detection Testing
📄 Memory Tags
📄 Microsoft Excel for Persistence
📄 Microsoft Office Templates for Persistence
📄 Modifying PAM to reveal Clear-text Credentials
📄 Module Stomping
📄 Network Service Discovery
📄 Network Sniffing
📄 NIC Teaming
📄 Non-Staged Payload
📄 NTLM Relay
📄 Office
📄 Online Data Conversions
📄 Online Password Cracking
📄 Open Source Intelligence (OSINT)
📄 Packer
📄 Password Spraying
📄 Payload Guardrails
📄 Payload Staging
📄 Payload Testing
📄 Phishing Frameworks
📄 Phishing Links
📄 Physical Bypass Tools
📄 PPID Spoofing
📄 Print Monitors
📄 Printing Kernel Debug Messages
📄 Process Hollowing
📄 Process Injection
📄 Redirectors
📄 Reflected XSS
📄 Registry Keys for Persistence
📄 Remote Code Execution
📄 Remote Direct Memory Access (RDMA)
📄 Reverse Engineering Books
📄 Rust Game Server
📄 Security Support Providers (SSPs) and Authentication Packages (APs)
📄 SeImpersonatePrivilege
📄 SetUID and SetGID
📄 Shellcode Loader
📄 Shellcode Loaders
📄 Shells Beyond the Firewall
📄 SMB Relay
📄 Spoof File Extentions (RTLO)
📄 SSH Authorized Keys and TrustedUserCAKeys
📄 SSH AuthorizedKeysCommand and AuthorizedKeysCommandUser
📄 Staged Payload
📄 Stageless Payload
📄 Static Analysis
📄 Steal or Forge Authentication Certificates (AD CS)
📄 Sticky Keys
📄 Stored XSS
📄 Suicide Hotlines
📄 System Network Configuration Discovery
📄 System Services
📄 Test Signing
📄 Time Stomping
📄 Top of Google Search
📄 Typo Squatting
📄 Understanding PCIe Windows
📄 Unsecured Credentials
📄 Vishing
📄 Visual Basic
📄 Webhooks
📄 Website Cloning
📄 Wifi Adapters for Pentesting
📄 Windows Kernel Exploits
📄 Windows Undocumented Structures
📁 Main Categories
📄 Development
📄 Lifestyle
📄 Offensive Security
📄 Reverse Engineering
📁 Secondary Categories
📄 Active Directory
📄 Career
📄 Command and Control
📄 Credential Access
📄 Cryptography
📄 CTF
📄 Dark Net
📄 Debugging
📄 Defense Evasion
📄 Exploit Development
📄 Game Hacking
📄 Hardware
📄 Homelab
📄 HowTo
📄 Information Gathering
📄 Infrastructure
📄 Initial Access
📄 Kiosk Break Out
📄 Lateral Movement
📄 Learning Material
📄 Malware
📄 Mental Health
📄 Persistence
📄 Physical
📄 Privacy
📄 Privilege Escalation
📄 Productivity
📄 Social Engineering
📄 Software Development
📄 Web Application
📄 Windows Internals
📄 Windows Kernel
Home
❯
02 Secondary Categories
❯
02-Debugging
02-Debugging
Sep 23, 2024
1 min read
01-Development
Recent Blog Posts
No More Network Bottlenecks
Sep 24, 2024
Unmasking Secrets - Deciphering Encrypted Passwords through Reverse Engineering
Nov 20, 2023
Conquering Goliath as a CCDC Blue Teamer
Feb 22, 2023