#hacking
Read more stories on Hashnode
Articles with this tag
BadUSB · For the largest part, developing a Ducky Script (from now on, DS) Payloads implies thinking out what stream of bytes depicts the actions that...
BadUSB · Abstract In the first article of this series, we introduced hotplug attacks. Here we will dwell more in detail, and make a few considerations on...
Introduction · Abstract Human Interface Devices attacks are as powerful as disregarded. In this article, we'll define the foundations of this family of...
MacOS Shellcode Primer #4 · Abstract In this series of articles, I am analysing the pieces of shellcode written by Odzhan on the page Shellcode: Mac OSX...
MacOS Shellcode Primer #3 · Abstract In this series of articles, I am analysing the pieces of shellcode written by Odzhan on the page Shellcode: Mac OSX...
MacOS Shellcode Primer #2 · Abstract In this series of articles, I am analysing the pieces of shellcode written by Odzhan on the page Shellcode: Mac OSX...