Essential Tools for Software Reverse Engineering and Cracking

Date: 10/07/2025

Every reverse engineer, malware analyst, and researcher eventually develops a personal toolkit of utilities they regularly use for analysis, unpacking, or cracking. In this review, I will share my own version. This will be useful for anyone who hasn’t yet compiled their own set and is just beginning to explore this field. However, even seasoned reverse engineers might find it interesting to see what tools their peers are using.
Read full article →

Exploring NixOS: The Unique and User-Friendly Linux Distribution

Date: 09/07/2025

How many times in your life have you reinstalled Linux? And how many times have you installed the same set of packages on multiple different machines? Have you ever had to start from scratch because of a failed system update or configuration? All of this is not only exhausting but can also lead to serious losses, especially in a business context. NixOS can help avoid such problems—a distribution that allows you to configure your system to the desired state with a single command.
Read full article →

Setting Up a Personal Cloud with Nextcloud: Is It Worth the Effort?

Date: 09/07/2025

“Should I install some software to make it easier to organize files on the server, share them, and access them from my phone?” I thought, and that’s when everything started to unfold! Even though my initial needs were modest, I decided to first take a look at Nextcloud—a personal cloud platform that not only replaces Dropbox but also does a bunch of other things, including document editing and even downloading torrents and videos from YouTube.
Read full article →

You won’t escape! Hijacking user sessions in Windows

Date: 08/07/2025

How often do you encounter a much-desired domain admin session on an outdated Windows 7 workstation? In the hands of a hacker pentester, this admin account is a ‘master key’ that can unlock the entire network. But imagine that an evil antivirus prevents you from dumping LSASS. What would you do in such a situation? How to hijack a user session bypassing all security mechanisms?
Read full article →