Hacker For Hire

Facebook Twitter RSS
  Menu
Skip to content
  • Home
  • Downloads
  • Exploits and Vulnerabilities
  • Infosec Blogroll
  • Services
    • Scam Recovery
    • Social Media Hacking
    • Catch Cheating Spouse
    • School Grades Hacking
    • Tailored Services
Facebook Twitter RSS
« Older posts

installing unicornscan on debian/ubuntu

By admin.au | June 1, 2025 - 9:02 am |June 1, 2025 Tools
Leave a comment

installing unicornscan on debian/ubuntu Looking back, I can’t remember a time where I used Nmap to perform UDP port scans. Pentesters are far too impatient to spend hours waiting for a UDP scan to finish in the hope of finding some badly configured service. Which is why I found it… →

part 3: cleaning and optimising shellcode

By admin.au | June 1, 2025 - 8:49 am |June 1, 2025 shellcode
Leave a comment

part 3: cleaning and optimising shellcode In Part 2: Building the shellcode, we created a bind shell on port 4444 which accepts connections from any host and then interacts with “/bin/sh” to facilitate remote code execution. Our shellcode however was littered with null bytes and would probably not be very… →

part 2: building the shellcode

By admin.au | June 1, 2025 - 8:40 am |June 1, 2025 shellcode
Leave a comment

part 2: building the shellcode In Part 1: Disassembling and Understanding Shellcode we disassembled some shellcode and found out the steps required to create a bind shell. In Part 2, we will take each of these 6 steps, understand them and write assembly instructions to call them. The steps we… →

part 1: disassembling and understanding shellcode

By admin.au | June 1, 2025 - 8:29 am |June 1, 2025 shellcode
Leave a comment

  About a month ago I signed up for the Securitytube Linux Assembly Expert certification to get a deeper understanding of assembly and GDB. Doing so has helped me understand what is actually going on in the registers and not just relying on “hail-mary” advice like “use pop, pop, ret… →

using perl to grab IP addresses of multiple hostnames

By admin.au | June 1, 2025 - 8:14 am |June 1, 2025 Script
Leave a comment

Recently while conducting a vulnerability assessment for a rather large customer I was given a list of hostnames from around 20 domains culminating in a list of over 5000 targets that needed to go through the motions. Due to scale of the testing I needed to run the scans from… →

Very Simple Caesar Cipher (Python)

By admin.au | June 1, 2025 - 8:10 am |June 1, 2025 Script, Tools
Leave a comment

During a recent CTF I needed to decrypt a page encrypted with a Caesar Cipher. I didn’t know the what the ROT was and I was struggling to find an easy yet useful one around so I wrote this one. Feel free to borrow it, steal it, claim it as… →

post exploitation: finding passwords in haystacks

By admin.au | June 1, 2025 - 7:20 am |June 1, 2025 Post Exploitation, Tools
Leave a comment

Often while conducting an internal pentest you may gain access to a user machine through some vulnerability or more commonly via social engineering. Let’s say that you pop a shell, unprivileged, and incognito only finds unprivileged domain tokens. You could move onto another target or you can try some post… →

data exfiltration over SSL with srvdir

By admin.au | June 1, 2025 - 7:13 am |June 1, 2025 Post Exploitation, Tools
Leave a comment

 Every now and then I come across some application that may or may not have been developed with penetration testing in mind but it ends up being damn helpful all the same. Yesterday I found a post about ‘srvdir‘ (surv~durr?) which is designed to share content over SSL/TLS via… →

cracking the infernal hades

By admin.au | June 1, 2025 - 6:57 am |June 1, 2025 General
Leave a comment

  About a month ago, Vulnhub released a boot2root image built by Lok_Sigma called Hades. The box promised to be full of annoyances and it delivered them in droves. Requiring a combination of exploit development, reverse engineering and some out of the box thinking, I really enjoyed this challenge. I… →

d0x’n myself beats the “hello world” post

By admin.au | June 1, 2025 - 6:52 am |June 1, 2025 General
Leave a comment

  My name is Ryan and I live in Sydney. My history is extremely boring and full of horror stories from racist countries so I’ll skip to 5 years ago in a hotel room in Perth, shortly after I moved to Australia. I liked to call myself an IT Professional but in all honesty… →

12
  • Recent Posts

    • installing unicornscan on debian/ubuntu
    • part 3: cleaning and optimising shellcode
    • part 2: building the shellcode
    • part 1: disassembling and understanding shellcode
    • using perl to grab IP addresses of multiple hostnames
  • Recent Comments

    No comments to show.
  • Archives

    • June 2025
  • Categories

    • cons
    • Documentary
    • Exploits
    • Fun
    • General
    • Post Exploitation
    • rant
    • Script
    • shellcode
    • Tools
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nulla massa diam, tempus a finibus et, euismod nec arcu. Praesent ultrices massa at molestie facilisis.
Hacker For Hire | Powered by Mantra & WordPress.
Facebook Twitter RSS