André LimaStarting dynamic analysis on a Windows x64 rootkitIn this blog post, we will be operating under the assumption that you have retrieved a Windows kernel rootkit sample and want to breakpoint…May 23, 2022May 23, 2022
André LimaExploit Development | Format Strings Series 1/6 — Intro and dumping sensitive dataMy new Youtube channel: jmp call pop, and my first video is now published:Aug 14, 2020Aug 14, 2020
André LimainThe StartupAssembly “wrapping”: a new technique for anti-disassemblyA new technique I came up with while playing with the “impossible disassembly” predicament.Jun 8, 2020Jun 8, 2020
André LimaOld blog -> New blogJust a reference to my previous blog at WordPress (https://pentesterslife.blog/) as I’ll be resuming blogging but now, here at Medium.Jun 6, 2020Jun 6, 2020
André LimaBypassing CSRF tokens with Python’s CGIHTTPServer to exploit SQL injectionsThere are ways to configure Burp using macros to bypass CSRF tokens on HTML forms, so we can use Burp Active Scans, Burp Intruder, Burp…Oct 12, 2017Oct 12, 2017