-
Collection for Package Sources
This is for programers in China, where people are a bit inconvenient to go online (off the G^F^W).After changing to the nativ... -
MSF Pentest Route
Nowadays we have plenty of mature pentest framework that can benefit us from information gathering to penetration testing per... -
About Port Forwarding
When performing penetration testing, there are always network connection limits.Port forwarding can bypass them and provide o... -
Domain Pentest Intro
Penetration testing is always a hot and attractive technology, and perform penetration testing in the windows domain is a fai... -
Learn Symbolic Execution and angr
Besides Fuzzing, Symbolic Execution is another choice to approach reverse engineering and binary analysis. Symbolic Executio... -
Wine Tips
Tips for dealing wine font or encoding problems. Solve Garbled TextInterfaceAfter installation of Wine, the execution and con... -
Analyse AFL Fuzzing Result
After doing fuzzing, we concentrate on result analysis. Check Fuzzer Statusafl-whatsupIt helps showing the running status and... -
AFL Fuzzing Intro
It’s not too late to learn fuzzing which is booming in this age. Fuzzing IntroWhen performing software vulnerability mining o... -
VirtualBox Tips
Here are some tips for virtual box. Minimize VirtualBox’s VM SpaceDefragLinux guest machine: 12$ sudo dd if=/dev/zero of=/EMP... -
Security Protection Mechanism
Binary vulnerabilities are executable files (PE, ELF files, etc.) that are not properly considered when encoding, causing sof...