My Blog

February 25, 2025

Exploiting delegatecall vulnerabilities in smart contracts

ethereumdelegatecallsmartcontract

February 20, 2025

Zero-Knowledge Proofs: Prove Your Bank Balance Without Revealing It

zkproofethereumcryptography

February 10, 2025

Writing Custom Shellcode in Assembly for Windows x86 (Finding Kernel32.dll)

windowsassemblyshellcode

February 10, 2025

Guest Podcast Thuis In IT (Dutch)

podcastthuis-inn-it

February 2, 2025

Bypassing ASLR and DEP using WriteProcessMemory

exploit developmentwindowswriteprocessmemory

January 31, 2025

ASLR and DEP bypass using VirtualAlloc

exploit developmentwindowsvirtualalloc

January 28, 2025

Android SSL Pinning Bypass

androidsslbypass

January 7, 2025

Manipulating the Blockchain for Fun and (NOT) for Profit

blockchainethereumsolidity

December 21, 2024

Stack Pivoting to leaking libc in limited stack space

ropchainstackpivotlibc

December 18, 2024

Creating a backdoor through APT sources

linuxaptbackdoor

December 17, 2024

Leaking libc through puts@got with ROPchains

exploit developmentlibcrop

December 10, 2024

Stealing Browser History: Exploiting CSS Timing Side-Channels with requestAnimationFrame

cssbrowserprivacy

December 9, 2024

Your Browser Leaks More Than You Think

webbrowserprivacy

December 4, 2024

Leverage XSS Impact with Capturing Photos and Videos

webxssvideo&photo

November 10, 2024

Prepared Statement Bypass in NodeJS MySQL

webmysqlbypass

November 9, 2024

Race against the machine: exploiting race conditions in coupons

webrace-conditionsexploit

November 8, 2024

Stealing Secrets from internal Web Pages from XSS through command injection

webxsscommand injection

November 6, 2024

MongoDB Injection (NoSQL) with Mongoose

webmongodbnosql

November 3, 2024

ImageMath PIL PoC - CVE-2022-22817 | Amidst Us (HTB)

webexploitspil

November 2, 2024

SQLi to Python Pickle Deserialization RCE | C.O.P (HTB)

webdeserializationsqli

November 1, 2024

Markdown XSS to Cache Poisoning through Directory Traversal

webxsscache

October 17, 2024

Bypassing CSP through jsDelivr

webexploitscsp

October 17, 2024

Escaping iframes dynamically

webexploitsiframes

October 15, 2024

Prototype Pollution in PugJS

webnodejsrce

October 8, 2024

Hiding Malware in SVG's: A new Threat to NFTs (DUTCH)

malwarenftsecurity

October 8, 2024

File Inclusion Cheat Sheet

webcheatsheetlfi

September 11, 2024

Circumventing DEP on x86 Windows

exploitswindowsdep

August 1, 2024

Deploying ERC-20 Tokens on Starknet with Caïro

blockchainsmartcontractscairo

May 10, 2024

Chainhunters - Criminal Blockchain Investigation

blockchaininvestigationchainhunters

April 8, 2024

Crypto Crime Training

blockchainsecuritytraining

April 8, 2024

Development of custom blockchain tokens and smart contracts at cryptomaker.nl

blockchainsmartcontractsweb3

April 8, 2024

Ethical hacking specialist at tozetta.com

pentestingsecurityconsulting

April 8, 2024

Hacking Smart Contracts and Exploiting Vulnerabilities on the Blockchain

blockchainsmartcontractssecurity