All Posts

  • Published on
    This guide covers the prerequisites, web server configuration, hidden service setup, and content deployment, ensuring users can host their own anonymous website on the Tor network.
  • Published on
    The necessary steps for local installation, dependency configuration, and deployment on the Amazon Web Services infrastructure are covered, including setting up EC2 instances, storage, and networking.
  • Published on
    Buffer overflow vulnerability in the GMON parameter of VulnServer, using fuzzing techniques and SEH-based exploitation to find and overwrite key registers, with the goal of executing malicious code on 32-bit Windows systems.
  • Published on
    Configuration of vulnerable web applications in virtual machines of the AWAE Offensive Security (WEB-300) course locally to carry out your white box practices based on the course syllabus
  • Published on
    This installation covers the prerequisites, web server configuration, database, and NextCloud installation, ensuring that users can set up their own cloud storage service efficiently and securely.