Illusion of privacy, Tor is hackable The notion of having privacy is an illusion even by using the state of…Read More
Hacking Team Word 2013 exploit Analysis In this study(PDF), an exploit of hacking team affecting Microsoft office 2007, 2010 and…Read More
Bypass DEP and NX bit | Bypass ASLR | Bypass Stack Canary and Cookie Buffer overflows are not anymore the…Read More
Python Hacking scripts | Hacking with python Both professional penetration testers and hackers need to learn hacking with python. Years…Read More
In this website authors are trying to convey their knowledge from varied fields of computer science with a concentration on professional experiences. The goal of this website to train readers is not only to be prepared to work in a professional setting but also to have a higher understanding of the underlying knowledge. Authors hope to consider all related aspects of one issue from perspectives such as software, network and security. The motivation of the founder of this website was lack of computer engineering related materials—with respect to all other related websites—that are covering one issue from all perspectives and analyzing the issue by providing real professional experiences. Thus authors expect that not only you can find answers to your problems but also at the end you can analyze similar problems with a deep insight to the issue you gained.