
Crack XOR Encryption (repeating key)
Crack XOR Encryption In one of my last articles I showed how to crack a single-byte XOR encryption quickly and … Read More “Crack XOR Encryption (repeating key)”
Crack XOR Encryption In one of my last articles I showed how to crack a single-byte XOR encryption quickly and … Read More “Crack XOR Encryption (repeating key)”
VIM AND TMUX In this video I show you how to install and configure VIM and TMUX. We will also … Read More “CREATE A CUSTOM WORKSPACE ENVIRONMENT WITH VIM AND TMUX”
Breaking XOR In this article we will look at how to implement a tool based on the “Go” programming language … Read More “Crack single-byte XOR encryption in GO”
Introduction In this article we will look at how we can use burp suite as an ssl proxy in python … Read More “Python: Proxy SSL Requests with Burp Suite”
Intro In this post, we’ll look at Vigenere encryption. We implement the method in Python and look at the Kasiki … Read More “Attacking Vigenere Cipher”
Explore & Reversing iOS Flutter App In this article we will perform a static and partly dynamic analysis on the … Read More “Explore & Reverse iOS Flutter App”
Breaking Hashes In this article we will look at how we can crack a hash using hashid and hashcat. For … Read More “Breaking Hashes”
Reverse Engineering & Cracking – Part II In the first part we looked at how we can change instructions, values … Read More “Reverse Engineering & Cracking – Part II”
Reverse Engineering & Cracking – Part I In this, first part of the series “Reverse Engineering & Cracking” we will … Read More “Reverse Engineering & Cracking – Part I”
Secure or not secure? Part II This is the second and last part. Part I can be found here. In … Read More “Secure or not secure? Part II”