Forensic Investigation: Solving Ann's Bad AIM Case with Wireshark
I'm BACK I'm very happy to be back. I hope you missed me. I've been up to some cool stuff outside of here. But let's...
things I wrote down before forgetting.
I'm BACK I'm very happy to be back. I hope you missed me. I've been up to some cool stuff outside of here. But let's...
Collaboration with João Vitor Borba "Borb4" Warning This post is not intended to encourage any illegal activity. Its purpose is to analyze the mechanisms employed...
Warning This post is not intended to encourage any illegal activity. Its purpose is to analyze the mechanisms employed by malicious attackers, serving as a...
Introduction Well, my buddy Heitor just pulled off something pretty cool – he built a fresh new application using the programming language I'm really fond...
Purpose This text aims to talk about the implementation of location systems in digital games. There is no intention to talk about how to write...
What is it? It is an attack using a device with a USB connection, changing its firmware, causing it to behave like an HID (Human...
Intro This post is intended to share an experiment I performed trying to create a chan forum. As a personal goal, I had the idea...