Skip to content

./MLT's_blog                                                 if (reader == n00b || reader == pro) { readBlog(); }

http://twitter.com/ret2libc

Posted on April 4, 2016August 30, 2016

Analysing SWF files for vulnerabilities

Posted on March 22, 2016March 23, 2016

A beginners guide to bug bounties

Posted on March 22, 2016

Using Facebook domain to serve malware

Posted on February 1, 2016April 18, 2017

An intro to advanced phishing techniques

Posted on January 20, 2016January 25, 2016

Military audits are necessary

Posted on January 11, 2016January 11, 2016

A tale of eBay XSS and shoddy incident response

Posted on January 3, 2016January 3, 2016

Hacking banks for fun and profit

Recent Posts

  • Analysing SWF files for vulnerabilities
  • A beginners guide to bug bounties
  • Using Facebook domain to serve malware
  • An intro to advanced phishing techniques
  • Military audits are necessary

Recent Comments

Recently patched XSS… on A tale of eBay XSS and shoddy…
Stephen Goudiet on A tale of eBay XSS and shoddy…
Ideas for Spear Phis… on Hacking banks for fun and prof…
Claudia Newcomb on Analysing SWF files for vulner…
magiczero on Analysing SWF files for vulner…

Archives

  • April 2016
  • March 2016
  • February 2016
  • January 2016

Categories

  • Uncategorized

Meta

  • Register
  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.com
Create a free website or blog at WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy