OccultByteBlog
Home
Archives
Categories
Tags
Search
About
ARCHIVES
2025
(10)
12-02 How I exploited Intel's Active Management Technology in China
12-01 How I hacked Russian guy with ADB Shell
11-16 Implementing Hill Cipher for data encryption
11-07 Attacking Russian scam website (Part I)
10-26 Forcing dead 4C+ to boot (Part I)
10-14 OffSec Squid game
09-30 OffSec ClamAV challenge
09-28 The first machine captured on OffSec Proving Grounds
09-27 How to avoid static detection when importing functions
09-26 My thoughts about people in the computer field
archives.md
Archives
10 posts
2025
(10 posts)
12-02
How I exploited Intel's Active Management Technology in China
Reding
Attacking
12-01
How I hacked Russian guy with ADB Shell
Reding
Attacking
11-16
Implementing Hill Cipher for data encryption
Cryptography
HillCipher
11-07
Attacking Russian scam website (Part I)
Reding
Attacking
10-26
Forcing dead 4C+ to boot (Part I)
Electronics
Radxa
10-14
OffSec Squid game
CTF
CTF
09-30
OffSec ClamAV challenge
CTF
CTF
09-28
The first machine captured on OffSec Proving Grounds
CTF
CTF
09-27
How to avoid static detection when importing functions
Malware
Malware
09-26
My thoughts about people in the computer field
RandomTalk
RandomTalk