Lethani

Ethical Hacking Blog

Last Post

Post Explotation Backdooring III

Third entry of PE Backdooring, this time with cipher code caves. There are no antivirus programs capable of detecting this technique.

Table of Contents

Here you can search for posts that belong to a category.

  • PoC's
  • Malware
  • Cryptography
  • Forensic
  • Pentesting
  • Hack The Box

These posts show Proof of Concept, to fully understand systems and tools.​ 

For virus lovers. This category also includes reversing posts. 

In this place you will find everything related to RSA, hashes, κρύπτos γραφή....

Computer forensic posts contain information on forensic expertise, device and network analysis, etc.

Here are the posts about what Hack The Box is, useful tools, tips, etc.