PwnDizzle

A meander along the bumpy path of modern day IT security...

Wednesday, 1 March 2017

Office Document Macros, OLE, Actions, DDE Payloads and Filter Bypass

›
There are a few different ways payloads can be delivered through Microsoft Office documents, including macros, OLE embedding, Addins, Action...
227 comments:
Tuesday, 30 August 2016

Random String Python Text Classifier Example

›
In this post I'm going to explain how to write a simple NaiveBayes text classifier in Python and provide some example code. Machine Le...
209 comments:
Tuesday, 27 October 2015

Parse Mimikatz Output One-Liner

›
Love mimikatz but hate the output? Yeah me too. In this post I'll show you how to parse the output with one simple line. The Output ...
45 comments:
Thursday, 23 July 2015

XSS, Extensions and Content-Types

›
In this post I'll look at which Content-Types and Extensions can actually be used for XSS in modern browsers. Why does Content-Type a...
102 comments:
Thursday, 30 April 2015

How to Bypass Sky Broadband Shield

›
This summary is not available. Please click here to view the post.
177 comments:
Wednesday, 31 December 2014

CREST CRT Exam Preparation

›
I'm going to be taking the CREST CRT exam in January and wanted to share my preparation notes with the world to save everyone else the ...
40 comments:
Wednesday, 26 November 2014

Traversal to Redirect to Remote JS XSS

›
I recently came across an interesting snippet of Javascript that looked exploitable but the path to exploitation wasn't that obvious. Th...
164 comments:
›
Home
View web version
Powered by Blogger.