• Get started
  • Explore
  • Docs
  • Blog
  • Sponsor
  • Consulting
  • Log in / Sign up

Recordings by thesp0nge

[BLOG] Obfuscating execve(/bin/sh): third rewrite 0:18

by thesp0nge 6 years ago

[BLOG] Obuscating execve(/bin/sh): second logical rewrite 0:23

by thesp0nge 6 years ago

[BLOG] Obfuscation exec(/bin/sh): first logical rewrite 0:47

by thesp0nge 6 years ago

[BLOG] Obfuscating exec(/bin/sh): start 0:24

by thesp0nge 6 years ago

[BLOG]: ud64 machine. From a restricted shell to root prompt using SUDO abuse against a strace like binary 2:03

by thesp0nge 6 years ago

[DAWNSCANNER]: Adding option to skip one or more security check 0:14

by thesp0nge 6 years ago

[BLOG]: a bind shell shellcode encoded with SUB EAX technique 1:08

by thesp0nge 6 years ago

[BLOG] Jump backward from your location shellcode 1:07

by thesp0nge 6 years ago

[BLOG]: fuzzing vulnserver with the improved version of my fuzzer 1:09

by thesp0nge 7 years ago

[BLOG]: fuzzing vulnserver with my own fuzzer 1:00

by thesp0nge 7 years ago

[BLOG][4ANDSIX] Privilege escalation 0:54

by thesp0nge 7 years ago

[BLOG][MATRIX] Final takeover sequence 2:11

by thesp0nge 7 years ago

[BLOG][MATRIX] Find guest password with ncrack 1:20

by thesp0nge 7 years ago

[BLOG][MATRIX] Download unknown file 0:47

by thesp0nge 7 years ago
  • 1
  • 2
  • 3
  • 4
  • >>
  • About asciinema.org
  • Terms of Service
  • Privacy Policy
Hosted by
Brightbox
  • Mastodon
  • Forum
  • Matrix
  • IRC