• Get started
  • Explore
  • Docs
  • Blog
  • Sponsor
  • Consulting
  • Log in / Sign up

Recordings by thesp0nge

[SLAE] Assignment 3: The egg hunter shellcode with a reverse shell on localhost port 4444 payload 1:05

by thesp0nge 7 years ago

[SLAE] Assignment 3: The egg hunter shellcode with a TCP bind shell shellcode on port 4444 payload 1:07

by thesp0nge 7 years ago

[SLAE] Assignment 3: The egg hunter shellcode with an execve("/bin/sh") payload 0:53

by thesp0nge 7 years ago

[SLAE] Assignment 2: The standard shellcode in action on our C launch program 0:52

by thesp0nge 7 years ago

[SLAE] Assignment 2: XORing IP address solves null byte shellcode problem 2:09

by thesp0nge 7 years ago

[SLAE] Assignment 2: TCP Reverse shell shellcode working 0:52

by thesp0nge 7 years ago

[SLAE] Assignment 2: Using the python script to configure a new IP and port for reverse shell 1:01

by thesp0nge 7 years ago

[SLAE] Assignment 1: use the python script to change the binding port 1:10

by thesp0nge 7 years ago

[SLAE] Assignment 1: extract the shellcode from compiled asm and verify it 1:24

by thesp0nge 7 years ago

[SLAE] Assignment 1: connecting to the BIND shellcode 1:01

by thesp0nge 7 years ago

Defeat crackme0x01 2:00

by thesp0nge 8 years ago

Find crackme0x01 password 2:16

by thesp0nge 8 years ago

Defeat crackme0x00 2:10

by thesp0nge 8 years ago

Find crackme0x00 password 0:50

by thesp0nge 8 years ago
  • <<
  • 1
  • 2
  • 3
  • 4
  • About asciinema.org
  • Terms of Service
  • Privacy Policy
Hosted by
Brightbox
  • Mastodon
  • Forum
  • Matrix
  • IRC