| 
					2017-03-09 13:31:56				 | 
				
					 Reverse Engineering Time to learn x86 ASM & gdb
				 | 
				
					2				 | 
			
						
				| 
					2017-03-09 11:12:35				 | 
				
					 Web PHP Fairy
				 | 
				
					2				 | 
			
						
				| 
					2015-09-25 06:22:25				 | 
				
					 Malware Analysis Capture 2 Part 4
				 | 
				
					3				 | 
			
						
				| 
					2015-09-24 11:25:15				 | 
				
					 Malware Analysis Capture 2 Part 2
				 | 
				
					1				 | 
			
						
				| 
					2015-09-24 11:24:41				 | 
				
					 Malware Analysis Capture 2 Part 3
				 | 
				
					1				 | 
			
						
				| 
					2015-09-07 03:06:58				 | 
				
					 Steganography Missing Pieces
				 | 
				
					2				 | 
			
						
				| 
					2015-09-04 10:29:12				 | 
				
					 Web Serial killer!
				 | 
				
					3				 | 
			
						
				| 
					2015-09-04 08:27:44				 | 
				
					 Web Security thru obscurity!
				 | 
				
					2				 | 
			
						
				| 
					2015-09-04 06:49:30				 | 
				
					 Forensics Who I am?
				 | 
				
					2				 | 
			
						
				| 
					2015-09-04 06:34:27				 | 
				
					 Cryptography Is it a secure string?
				 | 
				
					5				 | 
			
						
				| 
					2015-09-04 05:30:08				 | 
				
					 Reverse Engineering Introduction to MIPS
				 | 
				
					3				 | 
			
						
				| 
					2015-09-03 19:30:41				 | 
				
					 SysAdmin Linux SysAdmin Part 1
				 | 
				
					1				 | 
			
						
				| 
					2015-09-03 14:53:05				 | 
				
					 Forensics I made a dd of Agent Smith usb key
				 | 
				
					1				 | 
			
						
				| 
					2015-09-02 14:15:37				 | 
				
					 Steganography Hidden In Plain Sight
				 | 
				
					2				 | 
			
						
				| 
					2015-09-02 08:56:19				 | 
				
					 Forensics Hey Chuck where is the flag?
				 | 
				
					2				 | 
			
						
				| 
					2015-09-02 08:43:05				 | 
				
					 Web Password reset
				 | 
				
					2				 | 
			
						
				| 
					2015-09-02 07:59:37				 | 
				
					 Steganography Look inside the house
				 | 
				
					2				 | 
			
						
				| 
					2015-09-02 07:55:40				 | 
				
					 Steganography Brainsick
				 | 
				
					2				 | 
			
						
				| 
					2015-09-02 05:59:53				 | 
				
					 Steganography A ghost sound
				 | 
				
					2				 | 
			
						
				| 
					2015-09-02 04:32:55				 | 
				
					 Steganography You're lost? Use the map
				 | 
				
					1				 | 
			
						
				| 
					2015-09-01 13:12:10				 | 
				
					 Cryptography I Lost my password
				 | 
				
					3				 | 
			
						
				| 
					2015-09-01 05:36:37				 | 
				
					 Web Area 51
				 | 
				
					1				 | 
			
						
				| 
					2015-09-01 05:10:53				 | 
				
					 Cryptography Crypto is not good as you think
				 | 
				
					8				 | 
			
						
				| 
					2015-09-01 04:38:09				 | 
				
					 Steganography Victor reloaded
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 18:49:03				 | 
				
					 Coding Challenges Xor me if you can
				 | 
				
					6				 | 
			
						
				| 
					2015-08-31 18:16:09				 | 
				
					 Coding Challenges Number game
				 | 
				
					7				 | 
			
						
				| 
					2015-08-31 16:13:21				 | 
				
					 Web Headache
				 | 
				
					1				 | 
			
						
				| 
					2015-08-31 14:39:21				 | 
				
					 JavaScript Most Secure Crypto Algo
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 13:56:40				 | 
				
					 Coding Challenges Ascii Art
				 | 
				
					6				 | 
			
						
				| 
					2015-08-31 13:53:11				 | 
				
					 Cryptography Martian message part 2
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 13:45:48				 | 
				
					 Cryptography Martian message part 3
				 | 
				
					3				 | 
			
						
				| 
					2015-08-31 13:34:46				 | 
				
					 Cryptography Can you understand this sentence?
				 | 
				
					3				 | 
			
						
				| 
					2015-08-31 10:47:13				 | 
				
					 Coding Challenges Hash breaker
				 | 
				
					4				 | 
			
						
				| 
					2015-08-31 10:44:47				 | 
				
					 Forensics Hide my ass in my home!
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 10:30:21				 | 
				
					 Forensics Dr. Pouce
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 10:29:40				 | 
				
					 Coding Challenges I hate mathematics
				 | 
				
					3				 | 
			
						
				| 
					2015-08-31 10:18:45				 | 
				
					 Cryptography Some martian message
				 | 
				
					1				 | 
			
						
				| 
					2015-08-31 10:14:15				 | 
				
					 Coding Challenges Hash me reloaded
				 | 
				
					3				 | 
			
						
				| 
					2015-08-31 09:43:08				 | 
				
					 Reverse Engineering Crack Me 1
				 | 
				
					3				 | 
			
						
				| 
					2015-08-31 09:35:46				 | 
				
					 SQL Injection Most basic SQLi pattern.
				 | 
				
					1				 | 
			
						
				| 
					2015-08-31 09:34:58				 | 
				
					 Coding Challenges Hash me please
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 09:25:07				 | 
				
					 Forensics Attention Dinosaure Survive
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 07:58:14				 | 
				
					 Web Looking for password file
				 | 
				
					1				 | 
			
						
				| 
					2015-08-31 07:33:12				 | 
				
					 JavaScript Why not?
				 | 
				
					2				 | 
			
						
				| 
					2015-08-31 07:12:24				 | 
				
					 JavaScript Then obfuscation is more secure
				 | 
				
					1				 | 
			
						
				| 
					2015-08-31 07:03:09				 | 
				
					 JavaScript Hashing is more secure
				 | 
				
					1				 | 
			
						
				| 
					2015-08-31 06:58:02				 | 
				
					 Steganography Victor you're hidding me something
				 | 
				
					1				 | 
			
						
				| 
					2015-08-31 06:57:24				 | 
				
					 JavaScript Client side validation is bad!
				 | 
				
					1				 |