Introduction In this post, we will program an application in Golang that allows us to stream […]
Introduction In a current project I had the challenge to retrieve specific data for certain areas […]
Breaking XOR In this article we will look at how to implement a tool based on […]
Introduction In this article we will look at how we can use burp suite as an […]
Intro In this post, we’ll look at Vigenere encryption. We implement the method in Python and […]
Explore & Reversing iOS Flutter App In this article we will perform a static and partly […]
Breaking Hashes In this article we will look at how we can crack a hash using […]
Reverse Engineering & Cracking – Part II In the first part we looked at how we […]
Reverse Engineering & Cracking – Part I In this, first part of the series “Reverse Engineering […]
Secure or not secure? Part II This is the second and last part. Part I can […]