Stumbled upon your blog post and saw how you copy-paste the HellsDescent in asm to fit the function…```extern "C" NTSTATUS HellDescent(...);```. Note the three dots for variable parameters. This way you don't have to have all the copies…Jun 29, 2024Jun 29, 2024
[CVE-2019–5418] Ruby on Rails Arbitrary File Content Disclosure Analysis| Victor ZhuAnalysis of recent Ruby on Rails Arbitrary File Content Disclosure vulnerabilityApr 11, 2019Apr 11, 2019
Hack Some Bitcoin s — TradingView Charting Library XSS Vulnerablity | Victor ZhuTradingView has popular charting libraries which are used in many online trading platforms for stocks or cryptocurrencies. This…Sep 24, 2018Sep 24, 2018
CSAW CTF Quals ’18 Ldab — Web 50 Write-Up (LDAP Injection) | Victor ZhuThis is a straight-forward company directory. First thing came to our mind was SQL injection without thinking too much about the challenge…Sep 19, 20181Sep 19, 20181
Redis Unauthorized Access Vulnerability Simulation | Victor ZhuRedis, is an open source, widely popular data structure tool that can be used as an in-memory distributed database, message broker or…Sep 11, 20181Sep 11, 20181
Hack This Site Basic Missions Write-up | Victor ZhuBefore my write-up, I want to mention that I read some well-written write-ups/tutorials after solving the Basic Missions and they do a good…Jul 31, 2018Jul 31, 2018
Google Games 2016 @ RPIHave you ever heard of the Google Games? Get ready to have some fun! This “in a box” version of the Games includes head-to-head team…Apr 16, 2018Apr 16, 2018