| 
					2020-03-16 08:56:17				 | 
				
					 Reverse Engineering See No Evil - Part 5
				 | 
				
					4				 | 
			
						
				| 
					2020-03-15 12:39:01				 | 
				
					 Reverse Engineering See No Evil - Part 4
				 | 
				
					4				 | 
			
						
				| 
					2020-03-15 12:00:14				 | 
				
					 Reverse Engineering See No Evil - Part 3
				 | 
				
					3				 | 
			
						
				| 
					2020-03-15 11:11:02				 | 
				
					 Reverse Engineering See No Evil - Part 2
				 | 
				
					3				 | 
			
						
				| 
					2020-03-15 04:28:23				 | 
				
					 Reverse Engineering See No Evil - Part 1
				 | 
				
					2				 | 
			
						
				| 
					2019-04-22 08:00:07				 | 
				
					 SysAdmin Linux SysAdmin Part 1
				 | 
				
					1				 | 
			
						
				| 
					2018-09-28 12:58:50				 | 
				
					 Cryptography I Lost my password
				 | 
				
					3				 | 
			
						
				| 
					2018-09-28 08:30:05				 | 
				
					 Shellcoding Linux x64 shellcoding level 2
				 | 
				
					4				 | 
			
						
				| 
					2018-09-26 11:04:50				 | 
				
					 Coding Challenges Execute me if you can again
				 | 
				
					6				 | 
			
						
				| 
					2018-09-26 08:52:59				 | 
				
					 Coding Challenges Execute me if you can
				 | 
				
					5				 | 
			
						
				| 
					2018-09-25 16:50:31				 | 
				
					 Coding Challenges Ask your grandpa!
				 | 
				
					2				 | 
			
						
				| 
					2018-09-22 20:15:25				 | 
				
					 Reverse Engineering I never forget the Nintendo 64
				 | 
				
					3				 | 
			
						
				| 
					2018-09-22 20:08:09				 | 
				
					 Reverse Engineering Intro To Sparc
				 | 
				
					3				 | 
			
						
				| 
					2018-09-22 19:38:16				 | 
				
					 Reverse Engineering Introduction to MIPS
				 | 
				
					3				 | 
			
						
				| 
					2018-09-21 12:03:27				 | 
				
					 Reverse Engineering WASM Part 1
				 | 
				
					5				 | 
			
						
				| 
					2018-09-18 09:52:42				 | 
				
					 Jail Escaping C Jail 3
				 | 
				
					3				 | 
			
						
				| 
					2018-09-15 19:27:23				 | 
				
					 Shellcoding Basics of Linux x64 shellcoding
				 | 
				
					2				 | 
			
						
				| 
					2018-09-15 19:01:27				 | 
				
					 Jail Escaping C Jail 2
				 | 
				
					2				 | 
			
						
				| 
					2018-09-14 07:39:34				 | 
				
					 Reverse Engineering Wrong byte!
				 | 
				
					4				 | 
			
						
				| 
					2018-09-14 07:17:24				 | 
				
					 Reverse Engineering ASM Lovers
				 | 
				
					4				 | 
			
						
				| 
					2018-09-09 16:18:03				 | 
				
					 The NC8 Reverse Engineering Track NC8 MAINFRAME MANAGEMENT INTERFACE Part 1
				 | 
				
					7				 | 
			
						
				| 
					2018-09-09 10:49:45				 | 
				
					 Malware Analysis Capture 1 Part 1
				 | 
				
					1				 | 
			
						
				| 
					2018-09-09 08:46:39				 | 
				
					 Coding Challenges I saw a little elf
				 | 
				
					4				 | 
			
						
				| 
					2018-09-09 07:52:00				 | 
				
					 Coding Challenges Hash breaker
				 | 
				
					4				 | 
			
						
				| 
					2018-09-09 07:27:39				 | 
				
					 Coding Challenges I hate mathematics
				 | 
				
					3				 | 
			
						
				| 
					2018-09-09 07:17:27				 | 
				
					 Coding Challenges Hash me reloaded
				 | 
				
					3				 | 
			
						
				| 
					2018-09-07 16:56:04				 | 
				
					 Coding Challenges Hash me please
				 | 
				
					2				 | 
			
						
				| 
					2018-07-22 13:34:35				 | 
				
					 Reverse Engineering Time to learn x86 ASM & gdb
				 | 
				
					2				 | 
			
						
				| 
					2018-05-25 10:49:50				 | 
				
					 Forensics Dr. Pouce
				 | 
				
					2				 | 
			
						
				| 
					2018-05-25 10:18:23				 | 
				
					 Web Looking for password file
				 | 
				
					1				 | 
			
						
				| 
					2018-05-18 16:53:32				 | 
				
					 JavaScript Why not be more secure?
				 | 
				
					5				 | 
			
						
				| 
					2018-05-18 16:28:00				 | 
				
					 JavaScript Most Secure Crypto Algo
				 | 
				
					2				 | 
			
						
				| 
					2018-05-18 16:01:25				 | 
				
					 Exotic Data Storage Just another login form
				 | 
				
					2				 | 
			
						
				| 
					2018-05-18 15:58:52				 | 
				
					 SQL Injection Random Login Form
				 | 
				
					2				 | 
			
						
				| 
					2018-05-11 12:37:05				 | 
				
					 SQL Injection Login portal 1
				 | 
				
					2				 | 
			
						
				| 
					2018-05-11 08:54:41				 | 
				
					 JavaScript Why not?
				 | 
				
					2				 | 
			
						
				| 
					2018-05-11 08:48:04				 | 
				
					 JavaScript Then obfuscation is more secure
				 | 
				
					1				 | 
			
						
				| 
					2018-05-11 08:40:09				 | 
				
					 Forensics I made a dd of Agent Smith usb key
				 | 
				
					1				 | 
			
						
				| 
					2018-05-11 08:38:34				 | 
				
					 JavaScript Hashing is more secure
				 | 
				
					1				 | 
			
						
				| 
					2018-05-11 08:17:26				 | 
				
					 Jail Escaping C Jail 1
				 | 
				
					1				 | 
			
						
				| 
					2018-05-04 15:08:38				 | 
				
					 Jail Escaping Bash Jail 3
				 | 
				
					3				 | 
			
						
				| 
					2018-05-04 14:58:22				 | 
				
					 Jail Escaping Bash Jail 2
				 | 
				
					2				 | 
			
						
				| 
					2018-05-04 14:32:36				 | 
				
					 Jail Escaping Bash Jail 1
				 | 
				
					1				 | 
			
						
				| 
					2018-05-04 13:12:18				 | 
				
					 Reverse Engineering Windows x86 reversing is cool
				 | 
				
					3				 | 
			
						
				| 
					2018-05-04 12:59:41				 | 
				
					 JavaScript Client side validation is bad!
				 | 
				
					1				 | 
			
						
				| 
					2018-05-04 12:53:46				 | 
				
					 SQL Injection ACL rulezzz the world.
				 | 
				
					2				 | 
			
						
				| 
					2018-05-04 12:45:16				 | 
				
					 SQL Injection Most basic SQLi pattern.
				 | 
				
					1				 |