Republic of Pwning

Hacking, Reversing, Exploiting, CTFs...

  • Home
  • Team
  • Contact us
  • Archive

Follow us on:

  • Twitter
  • Github
  • Youtube
  • Email
  • Feed

EN

  • Two ways to dump the firmware of the ZTE ZXHN routers part 1
  • Code execution part 1: from exit to system
  • Rakion: Entities and editing cell creatures
  • Identifying vftables through MS's C++ RTTI
  • Bluefrost windows exploitation challenge for Ekoparty 2022
  • An easy way to reconstruct an ESP32 app image to ELF
  • Gamehacking: Rakion, the begining
  • NT infoleak CVE-2018-8121
  • Modulus Oracle & JWT
  • Modulus Oracle: Breaking a RSA misuse
  • BlueGate Internals
  • Pwning a miner's C&C
  • PolyUDF: Universal PostgreSQL UDF module for Windows

ES

  • Dos métodos para volcar el firmware del routers ZTE ZXHN parte 1
  • Ejecución de código parte 1: de exit to system
  • Blind SQLi Trick
  • Ekoparty 2020 - RAUS Writeup (Onapsis)
  • Ekoparty 2020 - PreCTF Writeup
  • Modulus Oracle & JWT
  • Modulus Oracle: Rompiendo un mal uso de RSA
  • Hackeando una botnet de minería
  • PolyUDF: Módulo UDF universal de PostgreSQL para Windows
  • © RoP. All rights reserved.
  • Design: HTML5 UP