OccultByteBlog
Home Archives Categories Tags Search About
ARCHIVES
2025 (10)
12-02 How I exploited Intel's Active Management Technology in China
12-01 How I hacked Russian guy with ADB Shell
11-16 Implementing Hill Cipher for data encryption
11-07 Attacking Russian scam website (Part I)
10-26 Forcing dead 4C+ to boot (Part I)
10-14 OffSec Squid game
09-30 OffSec ClamAV challenge
09-28 The first machine captured on OffSec Proving Grounds
09-27 How to avoid static detection when importing functions
09-26 My thoughts about people in the computer field
archives.md

Archives

10 posts
2025 (10 posts)
12-02
How I exploited Intel's Active Management Technology in China
Reding Attacking
12-01
How I hacked Russian guy with ADB Shell
Reding Attacking
11-16
Implementing Hill Cipher for data encryption
Cryptography HillCipher
11-07
Attacking Russian scam website (Part I)
Reding Attacking
10-26
Forcing dead 4C+ to boot (Part I)
Electronics Radxa
10-14
OffSec Squid game
CTF CTF
09-30
OffSec ClamAV challenge
CTF CTF
09-28
The first machine captured on OffSec Proving Grounds
CTF CTF
09-27
How to avoid static detection when importing functions
Malware Malware
09-26
My thoughts about people in the computer field
RandomTalk RandomTalk
master
Toko Tskhadiashvili
2025-12-02
Designed By  BlackCat