Sam RothlisbergerIndependent Dark Web Data Breach Query with PythonDISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…5 min read·5 days ago----
Sam RothlisbergerPDF Shortcut File with SSH Executed Dynamic Reverse SOCKS Proxy and Password File StealerDISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…7 min read·May 3, 2024--2--2
Sam RothlisbergerManual Indirect Syscalls and Obfuscation for Shellcode Execution15 min read·Mar 30, 2024----
Sam RothlisbergerVernam Cipher and Security by Obscurity ImplementationDISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…8 min read·Mar 17, 2024----
Sam RothlisbergerFile Shortcut Polyglot KeyloggerDISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…9 min read·Feb 17, 2024----
Sam RothlisbergerQuickly Creating a Custom Virtual Private Network (VPN)DISCLAIMER: Using these tools and methods against hosts that you do not have explicit permission to test is illegal. You are responsible…10 min read·Feb 11, 2024----