| 
					2020-07-27 10:18:04				 | 
				
					 Coding Challenges Hash breaker reloaded again
				 | 
				
					6				 | 
			
						
				| 
					2020-07-16 19:24:54				 | 
				
					 JavaScript Interstellar PhoneBook
				 | 
				
					6				 | 
			
						
				| 
					2020-07-16 15:26:05				 | 
				
					 JavaScript WTF Lol!
				 | 
				
					6				 | 
			
						
				| 
					2020-07-14 19:42:06				 | 
				
					 JavaScript Why not be more secure?
				 | 
				
					5				 | 
			
						
				| 
					2020-07-14 11:50:56				 | 
				
					 JavaScript Valid key required
				 | 
				
					2				 | 
			
						
				| 
					2020-07-14 11:14:47				 | 
				
					 JavaScript Most Secure Crypto Algo
				 | 
				
					2				 | 
			
						
				| 
					2020-05-20 10:33:48				 | 
				
					 Reverse Engineering Intro To Sparc
				 | 
				
					3				 | 
			
						
				| 
					2020-05-20 10:31:48				 | 
				
					 Reverse Engineering Introduction to MIPS
				 | 
				
					3				 | 
			
						
				| 
					2018-05-04 00:57:56				 | 
				
					 SQL Injection Login portal 1
				 | 
				
					2				 | 
			
						
				| 
					2018-05-03 02:05:27				 | 
				
					 Reverse Engineering Kernel introduction
				 | 
				
					3				 | 
			
						
				| 
					2017-08-18 11:24:30				 | 
				
					 Reverse Engineering Heap allocator
				 | 
				
					3				 | 
			
						
				| 
					2017-08-18 10:13:25				 | 
				
					 Coding Challenges Hash breaker reloaded
				 | 
				
					5				 | 
			
						
				| 
					2017-02-14 08:22:38				 | 
				
					 Cryptography Martian message part 3
				 | 
				
					3				 | 
			
						
				| 
					2017-02-14 08:18:16				 | 
				
					 Cryptography Can you understand this sentence?
				 | 
				
					3				 | 
			
						
				| 
					2017-02-14 08:16:54				 | 
				
					 Cryptography Martian message part 2
				 | 
				
					2				 | 
			
						
				| 
					2016-07-04 11:00:35				 | 
				
					 Pwnage Linux Remote Auth
				 | 
				
					2				 | 
			
						
				| 
					2015-02-17 17:24:21				 | 
				
					 Steganography Victor you're hidding me something
				 | 
				
					1				 | 
			
						
				| 
					2015-02-17 17:14:18				 | 
				
					 Reverse Engineering Need a client
				 | 
				
					6				 | 
			
						
				| 
					2015-01-19 11:51:09				 | 
				
					 SQL Injection ACL rulezzz the world.
				 | 
				
					2				 | 
			
						
				| 
					2015-01-01 08:36:15				 | 
				
					 Cryptography I Lost my password
				 | 
				
					3				 | 
			
						
				| 
					2015-01-01 08:31:57				 | 
				
					 Cryptography Public key recovery
				 | 
				
					2				 | 
			
						
				| 
					2015-01-01 07:36:47				 | 
				
					 Cryptography File recovery
				 | 
				
					1				 | 
			
						
				| 
					2014-08-28 07:31:48				 | 
				
					 Pwnage Linux Level2 Pwnage Linux Level Up
				 | 
				
					2				 | 
			
						
				| 
					2014-08-25 19:53:12				 | 
				
					 SQL Injection Most basic SQLi pattern.
				 | 
				
					1				 | 
			
						
				| 
					2014-08-24 20:38:15				 | 
				
					 Shellcoding Basics of Linux x64 shellcoding
				 | 
				
					2				 | 
			
						
				| 
					2014-08-23 07:17:42				 | 
				
					 Web Headache
				 | 
				
					1				 | 
			
						
				| 
					2014-08-22 05:31:12				 | 
				
					 Coding Challenges Read me if you can
				 | 
				
					6				 | 
			
						
				| 
					2014-08-21 17:33:12				 | 
				
					 Coding Challenges Execute me if you can
				 | 
				
					5				 | 
			
						
				| 
					2014-08-18 18:28:58				 | 
				
					 Pwnage Linux Level1 Pwnage Linux Level Up
				 | 
				
					1				 | 
			
						
				| 
					2014-08-15 14:45:42				 | 
				
					 Reverse Engineering I never forget the Nintendo 64
				 | 
				
					3				 | 
			
						
				| 
					2014-08-14 17:34:49				 | 
				
					 Forensics I made a dd of Agent Smith usb key
				 | 
				
					1				 | 
			
						
				| 
					2014-08-14 17:16:34				 | 
				
					 Web Area 51
				 | 
				
					1				 | 
			
						
				| 
					2014-08-14 11:20:08				 | 
				
					 Web Looking for password file
				 | 
				
					1				 | 
			
						
				| 
					2014-07-27 17:30:34				 | 
				
					 Forensics The words flew but writing remains
				 | 
				
					3				 | 
			
						
				| 
					2014-07-23 17:02:20				 | 
				
					 JavaScript Why not?
				 | 
				
					2				 | 
			
						
				| 
					2014-07-23 14:50:24				 | 
				
					 Reverse Engineering Time to learn x86 ASM & gdb
				 | 
				
					2				 | 
			
						
				| 
					2014-07-23 14:27:48				 | 
				
					 Coding Challenges Hash me reloaded
				 | 
				
					3				 | 
			
						
				| 
					2014-07-23 11:29:35				 | 
				
					 Coding Challenges Hash me please
				 | 
				
					2				 | 
			
						
				| 
					2014-07-23 11:06:35				 | 
				
					 Coding Challenges I saw a little elf
				 | 
				
					4				 | 
			
						
				| 
					2014-07-22 14:35:29				 | 
				
					 Coding Challenges Hash breaker
				 | 
				
					4				 | 
			
						
				| 
					2014-07-22 13:44:17				 | 
				
					 Coding Challenges I hate mathematics
				 | 
				
					3				 | 
			
						
				| 
					2014-07-21 10:00:00				 | 
				
					 JavaScript Then obfuscation is more secure
				 | 
				
					1				 | 
			
						
				| 
					2014-07-21 09:31:56				 | 
				
					 JavaScript Hashing is more secure
				 | 
				
					1				 | 
			
						
				| 
					2014-07-21 09:30:36				 | 
				
					 JavaScript Client side validation is bad!
				 | 
				
					1				 | 
			
						
				| 
					2014-07-20 22:42:47				 | 
				
					 Reverse Engineering Can you see through the star
				 | 
				
					2				 | 
			
						
				| 
					2014-07-20 22:34:10				 | 
				
					 Reverse Engineering Windows x86 reversing is cool
				 | 
				
					3				 | 
			
						
				| 
					2014-07-20 21:57:18				 | 
				
					 Reverse Engineering Crack Me 1
				 | 
				
					3				 | 
			
						
				| 
					2014-07-20 19:59:12				 | 
				
					 Cryptography Some martian message
				 | 
				
					1				 |