All pages for: hacking
- What do you want to learn about Websites, APIs and Servers security?
- What are Autonomous Systems and why they matter (a lot) for your security
- Derive secure keys in Go with HKDF and SHA256
- Legalizing spyware. What can go wrong?
- Links of the week #2023-22
- Links of the week #2023-21
- Breaking SHA256: length extension attacks in practice (with Go)
- How to generate a SHA256 HMAC in Go
- Fast hashing, it's not that simple
- Links of the week #2023-11
- Apple advanced data protection: A game-changer for privacy?
- Links of the week #2023-10
- Links of the week #2023-09
- Links of the week #2023-08
- Links of the week #2023-06
- Links of the week #2023-05
- Links of the week #2023-04
- Links of the week #2023-03
- Links of the week #2023-02
- Links of the week #2023-01
- Links of the week #2022-51
- Links of the week #2022-47
- Links of the week #2022-46
- Links of the week #2022-45
- Links of the week #2022-44
- Temporarily lock an iPhone or iPad to require your passcode instead of FaceID or TouchID
- Links of the week #2022-43
- Scanning and generating QR Codes on Ubuntu Linux with the command line
- Links of the week #2022-42
- Links of the week #2022-41
- Links of the week #2022-40
- Hacking a Kindle into a focused note taking and writing device
- When to vendor (or not) your dependencies in Rust
- How to create an encrypted zip file with a password
- Learning Rust: The derive attribute
- Links of the week #2022-39
- How to use OpenSSL to encrypt/decrypt files
- Public Toilets and Social Credit
- Multithreading in Rust
- Links of the week #2022-37
- Learn Rust by implementing a SHA-1 hash cracker
- Links of the week #2022-36
- iPhone = Privacy?
- Learning Rust: Async Combinators
- Links of the week #2022-35
- Black Hat Rust "Back2School" Discount
- Learning Rust: Combinators
- How to send messages to a private Telegram channel from a bot
- Denial of Wallet Attacks: The new (D)DoS in a Serverless world
- Advanced shellcode in Rust
- Announcing the biggest update of 2022: Memberships
- Black Hat Rust updated for Rust 1.62 (and announcing the online course)
- Automated maintenance and dependencies security for Rust projects
- Building a web application with Rust and WebAssembly
- (Ab)using technology for fun & profit
- Introduction to Rust generics [2/2]: Trait Objects (Static vs Dynamic dispatch)
- Introduction to Rust generics [1/2]: Traits
- Defending against malicious bots with a zip bomb
- Testing and building your Rust project with GitHub Actions
- Optimizing the size of your Rust binaries
- Bitsquatting attacks and exploitation with Rust
- Evil Twin Attacks in practice (with Rust and a Raspberry Pi)
- Building a crawler in Rust: Scraping Javascript Single Page Applications (SPA) with a headless browser
- Building a crawler in Rust: Crawling a JSON API
- Bugs that the Rust compiler catches for you
- Building a crawler in Rust: Scraping and Parsing HTML
- Building a crawler in Rust: Implementing the crawler
- Let's talk about supply chain attacks and backdoored dependencies
- Building a crawler in Rust: Synchronization (Atomic Types and Barriers)
- Building a crawler in Rust: Design and Associated Types
- How to get started into Bug Bounty: The Guide
- Rust's fearless concurrency in practice
- The 5 profiles of cyber operators
- Cross-compilation in Rust
- Rust is minimalist
- Hacking Stories #3 - The Puppet Master
- Functional Programming in Rust
- Mental models for learning Rust
- The foundations of end-to-end encryption: Key exchange (with code example in Rust)
- The foundations of end-to-end encryption: Domain separation (with code example in Rust)
- The simplest guide to error handling in Rust
- Async Rust: What is a runtime? Here is how tokio works under the hood
- Async Rust: Cooperative vs Preemptive scheduling
- CSRF vulnerabilities: How to exploit and how to defend
- How to securely encrypt a file with an insecure password in Rust (using Streaming Encryption + Argon2)
- Secure and immutable development environments with Dev Containers
- Hacking Stories #2 - The virus that came in from the cold
- You can now buy Black Hat Rust with PayPal, Apple Pay & Google Pay
- How to encrypt a file in Rust (Using streaming AEAD encryption)
- The tools and services I used to write, edit and self-publish my book
- Black Hat Week (Black Hat Rust is out 🍾)
- Position Independent Shellcodes in Rust (PIC)
- Backdooring Rust crates for fun and profit
- Hacking Stories
- Hacking Stories #1 - The Evil Twin
- Signatures: The foundations of modern end-to-end encryption
- Black Hat Rust October Update (now in Beta 🍾)
- Reproducible cross-compilation for Rust (with Docker)
- Freedom: the core value of hackers
- How to Write and Compile a Shellcode in Rust
- Why Rust for offensive security
- Framing: the foundations of persuasion
- Overview of the Rust cryptography ecosystem
- A fast port scanner in 100 lines of Rust
- The foobar challenge: Google's secret hiring program
- HTTP Security Headers: The Best Practices
- Black Hat Rust: July Update
- Hello Simplon
- How to execute shellcodes from memory in Rust
- The unusual way I'm funding my open source work
- Introduction au reverse engineering - Android
Want to learn Rust, Cryptography and Security? Get my book Black Hat Rust!