OccultByteBlog
Home
Archives
Categories
Tags
Search
About
ARCHIVES
2026
(3)
02-18 Incompetent people and Low-level programming
02-16 Weird cyberwarfare and exploitation of military equipment
02-03 How I developed x64 reverse shell shellcode
2025
(10)
12-02 How I exploited Intel's Active Management Technology in China
12-01 How I hacked Russian guy with ADB Shell
11-16 Implementing Hill Cipher for data encryption
11-07 Attacking Russian scam website (Part I)
10-26 Forcing dead 4C+ to boot (Part I)
10-14 OffSec Squid game
09-30 OffSec ClamAV challenge
09-28 The first machine captured on OffSec Proving Grounds
09-27 How to avoid static detection when importing functions
09-26 My thoughts about people in the computer field
archives.md
Archives
13 posts
2026
(3 posts)
02-18
Incompetent people and Low-level programming
RandomTalk
RandomTalk
02-16
Weird cyberwarfare and exploitation of military equipment
Reding
China
02-03
How I developed x64 reverse shell shellcode
Reding
Shellcode
2025
(10 posts)
12-02
How I exploited Intel's Active Management Technology in China
Reding
Attacking
12-01
How I hacked Russian guy with ADB Shell
Reding
Attacking
11-16
Implementing Hill Cipher for data encryption
Cryptography
HillCipher
11-07
Attacking Russian scam website (Part I)
Reding
Attacking
10-26
Forcing dead 4C+ to boot (Part I)
Electronics
Radxa
10-14
OffSec Squid game
CTF
CTF
09-30
OffSec ClamAV challenge
CTF
CTF
09-28
The first machine captured on OffSec Proving Grounds
CTF
CTF
09-27
How to avoid static detection when importing functions
Malware
Malware
09-26
My thoughts about people in the computer field
RandomTalk
RandomTalk