Serpent anatomy: Dissecting and reversing PyInstaller

Date: 25/03/2025

Humanity has created a whole bestiary of scripting languages ​​with low learning curves in an attempt to make the IT world accessible to imbeciles newbies who have completed a month-long course. Without question, Python is currently the king of beasts in this bestiary. The creeping reptile has entangled the entire IT industry with its rings so much that even a neural network cannot be trained without it. If so, time has come to dissect the serpent and look at its insides. Let’s start with a technology called PyInstaller.
Read full article →

ADS-B Spoofing

Date: 17/03/2025

Modern aircraft continuously transmit telemetry to each other using the ADS-B protocol. In this article, I will explain how to create your own imaginary plane and demonstrate how data transmission works. Important: all actions described below will be performed in strict compliance with the respective laws and safety regulations.
Read full article →

ADS-B guide

Date: 24/02/2025

Wherever you are, aircraft frequently pass overhead; sometimes several ones in a few minutes. Services like Flightradar24 provide precise real-time information about these flights using data received over the ADS-B protocol. You can also receive and decode such data; just follow instructions provided in this guide!
Read full article →

Safe Python: Secure coding techniques

Date: 10/02/2025

This article discusses an important matter every cool hacker programmer should care about: secure code. Perhaps, you think it’s boring and difficult? Not at all! Today I will share with you some of my experience and show how to write Python code you can be proud of.
Read full article →

Challenge the Keemaker! How to bypass antiviruses and inject shellcode into KeePass memory

Date: 03/06/2022

Recently, I was involved with a challenging pentesting project. Using the KeeThief utility from GhostPack, I tried to extract the master password for the open-source KeePass database from the process memory. Too bad, EDR was monitoring the system and prevented me from doing this: after all, KeeThief injects shellcode into a remote process in a classical oldie-goodie way, and in 2022, such actions have no chance to go unnoticed.
Read full article →

EVE-NG: Building a cyberpolygon for hacking experiments

Date: 15/02/2022

Virtualization tools are required in many situations: testing of security utilities, personnel training in attack scenarios or network infrastructure protection, etc. Some admins reinvent the wheel by assembling fearsome combinations of virtual machines and all kinds of software. I suggest another way: set up an emulation platform using EVE-NG and create on its basis a universal scalable cyberpolygon enabling networking and security specialists to polish their skills.
Read full article →