The Art of Clipboard Forensics Recovering Delet...
Introduction In this blog post, I’ll be sharing my notes from my exploration of clipboard forensics. I’ll cover the tools...
Myths About External C2
In this blog post I will show you how to build a External C2 in your C2. Excuse me I...
Access Token Manipulation Part 0x02
Introduction This is part 2 of Access Token Manipulation blog. In this blog post I’m gonna talk about building a...
Access Token Manipulation Part 0x01
Introduction In this blog post, I’m going to show the most three common access token techniques. Steal Token Revert2Self Make...
UART Explanation | IoT Hacking Series Part 0x01
Introduction Hi @everybody, I’m Ret2pwn in this series I’m going to talk about hardware hacking from zero knowledge to zero...
CVE-2021-40444 Analysis/Exploit
Intro I’m writing the blog post when I have no technical background on this exploit. So I would like to...
PickleC2
PickleC2 is a post-exploitation and lateral movements framework Documentation ReadTheDocs Overview RET2pwn releasing a PickleC2 framework written in python3 used...