0xmitsurugi
Reverse, exploit, pwn. My blade is angry... Want a taste?! The name's 0xMitsurugi. Don't forget it.
Pinned Repositories
afterburner
Creating innocuous client for botnet
Analyzing-zip-file-with-.wsf-file-inside
gdbscripts
Python scripts for gdb, reverse engineering oriented
gimmecredz
You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all passwords from known locations.
PatchFuncName
http://0x90909090.blogspot.fr/2018/02/fun-with-function-names-where-resolving.html
SandboxingMalware
A malware sandoxed with gdb
tcpdump
the TCPdump network dissector
WU-2016
WU-2017
WU-2019
Writeups for CTF that took place in 2019.
0xmitsurugi's Repositories
0xmitsurugi/gimmecredz
You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all passwords from known locations.
0xmitsurugi/gdbscripts
Python scripts for gdb, reverse engineering oriented
0xmitsurugi/SandboxingMalware
A malware sandoxed with gdb
0xmitsurugi/Analyzing-zip-file-with-.wsf-file-inside
0xmitsurugi/afterburner
Creating innocuous client for botnet
0xmitsurugi/PatchFuncName
http://0x90909090.blogspot.fr/2018/02/fun-with-function-names-where-resolving.html
0xmitsurugi/tcpdump
the TCPdump network dissector