February 25, 2025
Exploiting delegatecall vulnerabilities in smart contracts
February 20, 2025
Zero-Knowledge Proofs: Prove Your Bank Balance Without Revealing It
February 10, 2025
Writing Custom Shellcode in Assembly for Windows x86 (Finding Kernel32.dll)
Guest Podcast Thuis In IT (Dutch)
February 2, 2025
Bypassing ASLR and DEP using WriteProcessMemory
January 31, 2025
ASLR and DEP bypass using VirtualAlloc
January 28, 2025
Android SSL Pinning Bypass
January 7, 2025
Manipulating the Blockchain for Fun and (NOT) for Profit
December 21, 2024
Stack Pivoting to leaking libc in limited stack space
December 18, 2024
Creating a backdoor through APT sources
December 17, 2024
Leaking libc through puts@got with ROPchains
December 10, 2024
Stealing Browser History: Exploiting CSS Timing Side-Channels with requestAnimationFrame
December 9, 2024
Your Browser Leaks More Than You Think
December 4, 2024
Leverage XSS Impact with Capturing Photos and Videos
November 10, 2024
Prepared Statement Bypass in NodeJS MySQL
November 9, 2024
Race against the machine: exploiting race conditions in coupons
November 8, 2024
Stealing Secrets from internal Web Pages from XSS through command injection
November 6, 2024
MongoDB Injection (NoSQL) with Mongoose
November 3, 2024
ImageMath PIL PoC - CVE-2022-22817 | Amidst Us (HTB)
November 2, 2024
SQLi to Python Pickle Deserialization RCE | C.O.P (HTB)
November 1, 2024
Markdown XSS to Cache Poisoning through Directory Traversal
October 17, 2024
Bypassing CSP through jsDelivr
Escaping iframes dynamically
October 15, 2024
Prototype Pollution in PugJS
October 8, 2024
Hiding Malware in SVG's: A new Threat to NFTs (DUTCH)
File Inclusion Cheat Sheet
September 11, 2024
Circumventing DEP on x86 Windows
August 1, 2024
Deploying ERC-20 Tokens on Starknet with Caïro
May 10, 2024
Chainhunters - Criminal Blockchain Investigation
April 8, 2024
Crypto Crime Training
Development of custom blockchain tokens and smart contracts at cryptomaker.nl
Ethical hacking specialist at tozetta.com
Hacking Smart Contracts and Exploiting Vulnerabilities on the Blockchain