MalwareDev C/C++

Access Token Manipulation Part 0x02
Introduction This is part 2 of Access Token Manipulation blog. In this blog post I’m gonna talk about building a...
MalwareDev C/C++

Access Token Manipulation Part 0x01
Introduction In this blog post, I’m going to show the most three common access token techniques. Steal Token Revert2Self Make...
IoT Security Hardware Security

UART Explanation | IoT Hacking Series Part 0x01
Introduction Hi @everybody, I’m Ret2pwn in this series I’m going to talk about hardware hacking from zero knowledge to zero...
CVE-2021-40444 Exploit Redteam CVE

CVE-2021-40444 Analysis/Exploit
Intro I’m writing the blog post when I have no technical background on this exploit. So I would like to...
Python Command&Control Redteam PickleC2

PickleC2
PickleC2 is a post-exploitation and lateral movements framework Documentation ReadTheDocs Overview RET2pwn releasing a PickleC2 framework written in python3 used...