Skip to content
  • Linkedin
  • Twitter
  • Email
  • RSS
  • GitHub
Niemand - Cyber SecurityCyber Security Blog
  • Home
  • About me

Author: niemand

PwnAdventures3 – Part 2 – Making ourselves stronger

niemandPosted on July 11, 2018February 21, 20190

In my previous post, I covered off, how to modify the game using Cheat Engine and IDA in order to be able to cast as many spells as we want without spending Mana, in a …

Read more →

PwnAdventures3 – Reversing games from Scratch

niemandPosted on July 3, 2018February 21, 20191

For those who don’t know PwnAdventures, I leave you here a link so you can read a bit about it and try it if you want. Basically, PwnAdventures was created for Ghost in the Shellcode …

Read more →

Automatizing Burp + Carbonator + Slack

niemandPosted on September 18, 2017February 28, 20181

tl;dr I few days ago I decided to try to automatize some activities using Burp. The main goal was to install it in my VPS (without GUI) and try to interact as little as possible. …

Read more →

From 404 and default pages to RCE via .cshtml webshell

niemandPosted on May 5, 2017May 6, 20170

Introduction This is my first Blog ever (yes it’s the first time I have a Blog, I have participated in multiple communities and forums since I was a teenager but never have had my own). …

Read more →

Posts navigation

« Previous 1 2

Follow me

Follow @niemand_sec

Search

Categories

  • Cheating
  • CTF
  • Exploiting
  • Remote Code Execution
  • Reversing
  • Talks
  • Tools

Recent Posts

  • Protected: Giving my first International talk – Recon2019
  • Reversing a Black Desert Online Dump: Restoring IAT with IDAPython and FLIRT signatures
  • Why leveling if you can just use Lua? Hacking Lua inside Games
  • Scripting Engines inside Games? You can hack them too! (AngelScript)
  • Virtual Method Table Hooking Explained

Archives

  • July 2019
  • February 2019
  • January 2019
  • August 2018
  • July 2018
  • September 2017
  • May 2017

Contact

Twitter

Twitter

Linkedin

Email

Copyright © 2019 Niemand - Cyber Security Proudly powered by WordPress