Baby's first NX+ASLR bypass
May 20, 2014 | Dan Crowley
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from Trustwave, A LevelBlue Company.
DEFCON 22 CTF Qualifiers Writeup
May 20, 2014 | Dan Crowley
Hi folks!
Defeating AES without a PhD
January 17, 2013 | Dan Crowley
"Cryptography is typically bypassed, not penetrated." – Adi Shamir FAITH IN THE ...
The Patsy Proxy: Getting others to do your dirty work
August 30, 2012 | Dan Crowley
Patsy (slang) - A person easily taken advantage of, cheated, blamed, or ...
Too XXE For My Shirt
May 16, 2012 | Dan Crowley
Until tonight, I'd never gotten a chance to try an xml external entity (XXE) ...
LIKE, omg!
March 15, 2012 | Dan Crowley
If you read this blog, you might have seen my earlier post regarding my ...
On Null Byte Poisoning and XPath Injection
January 23, 2012 | Dan Crowley
Recently I released a tool called XMLmao, a configurable testbed for learning ...
Introducing SQLol
January 06, 2012 | Dan Crowley
At the most recent Austin Hackers Association meeting I unveiled a project I've ...
My Other Ride is Your Image Upload Script(1)
June 13, 2011 | Dan Crowley
Many security issues are based upon mistaken assumptions. For instance, when ...
My Other Ride is Your Image Upload Script
June 13, 2011 | Dan Crowley
Many security issues are based upon mistaken assumptions. For instance, when ...