Taking bytes as input in python3

Hey everyone, I have been working on protocol reverse engineering and on an RE assisting tool called netzob (I cloned it and will make a fork publicly available soon enough). Because the user often works with raw bytes, at some point I needed the user to input bytes. However there…

Apk reversing ; Removing ads

Hey everyone! Just recently I started getting interested in reversing android apk's. In order to get an internship in a company, I had to find some flags in apk's they sent me. It was a very interesting experience as I had never played with apk's before. I will write an…

Prison Break (chroot)

So I had a class the other day where the teacher basically talked about chroot jails and said that it was possible to escape from it once you had root acces. However he thought it was pretty difficult whereas some other teacher and quite a few people from the internet…

Metasploit on docker

Hey everyone, just payed for a new VPS and this is my very first post on using metasploit on docker. Why docker? Because it's an out of the box solution and it's really fast to set up. I know there's quite a few tutorials out there about setting up metasploit…