Hacker News
- Another Tale of IBM I (AS/400) Hacking (2022) https://blog.silentsignal.eu/2022/09/28/another-tale-of-ibm-i-as-400-hacking/ 13 comments
- Our new tool for enumerating hidden Log4Shell-affected hosts https://blog.silentsignal.eu/2021/12/12/our-new-tool-for-enumerating-hidden-log4shell-affected-hosts/ 3 comments
- Abusing JWT public keys without the public key https://blog.silentsignal.eu/2021/02/08/abusing-jwt-public-keys-without-the-public-key/ 2 comments
- Poisonous MD5 – Wolves Among the Sheep http://blog.silentsignal.eu/2015/06/10/poisonous-md5-wolves-among-the-sheep/ 52 comments
Lobsters
- Children’s Bible Coloring Book of PoC || GTFO http://blog.silentsignal.eu/wp-content/uploads/2014/01/pocorgtfo02.pdf 2 comments pdf , security
- Story of a Pentester Recruitment 2025 https://blog.silentsignal.eu/2025/01/14/pentester-recruitment-2025-mushroom/ 17 comments netsec
- Engineering WCF Hacks https://blog.silentsignal.eu/2024/10/28/wcf-net.tcp-pentest/ 3 comments netsec
- Our new scanner for Text4Shell https://blog.silentsignal.eu/2022/10/18/our-new-scanner-for-text4shell/ 5 comments netsec
- Another Tale of IBM i (AS/400) Hacking https://blog.silentsignal.eu/2022/09/28/another-tale-of-ibm-i-as-400-hacking/ 15 comments netsec
- Simple IBM i (AS/400) hacking https://blog.silentsignal.eu/2022/09/05/simple-ibm-i-as-400-hacking/ 11 comments netsec
- Our new tool for enumerating hidden Log4Shell-affected hosts https://blog.silentsignal.eu/2021/12/12/our-new-tool-for-enumerating-hidden-log4shell-affected-hosts/ 23 comments netsec
- Decrypting and analyzing HTTPS traffic without MITM (includes new Burp extension) https://blog.silentsignal.eu/2020/05/04/decrypting-and-analyzing-https-traffic-without-mitm/ 23 comments netsec
- Patching Android apps: what could possibly go wrong https://blog.silentsignal.eu/2019/10/21/patching-android-apps-what-could-possibly-go-wrong/ 3 comments netsec
- Evading Cisco AnyConnect blocking LAN connections https://blog.silentsignal.eu/2019/07/02/evading-cisco-anyconnect-blocking-lan-connections/ 25 comments netsec
- The curious case of encrypted URL parameters https://blog.silentsignal.eu/2018/05/22/the-curious-case-of-encrypted-url-parameters/ 14 comments netsec
- Oracle Golden Gate exploits and the state of defense https://blog.silentsignal.eu/2017/05/08/fools-of-golden-gate/ 4 comments netsec
- Beyond detection: exploiting blind SQL injections with Burp Collaborator https://blog.silentsignal.eu/2017/01/03/beyond-detection-exploiting-blind-sql-injections-with-burp-collaborator/ 14 comments netsec
- An update on MD5 poisoning - It's not just one vendor! https://blog.silentsignal.eu/2016/11/28/an-update-on-md5-poisoning/ 5 comments netsec
- Accessing local variables in ProGuarded Android apps https://blog.silentsignal.eu/2016/06/16/accessing-local-variables-in-proguarded-android-apps/ 5 comments netsec
- Detecting ImageTragick with Burp Suite Pro https://blog.silentsignal.eu/2016/05/13/detecting-imagetragick-with-burp-suite-pro/ 12 comments netsec
- Proxying nonstandard HTTPS traffic http://blog.silentsignal.eu/2015/10/02/proxying-nonstandard-https-traffic/ 6 comments netsec
- Poisonous MD5 – Wolves Among the Sheep http://blog.silentsignal.eu/2015/06/10/poisonous-md5-wolves-among-the-sheep/ 21 comments programming
- Evading security products using MD5 collisions http://blog.silentsignal.eu/2015/06/10/poisonous-md5-wolves-among-the-sheep/ 87 comments netsec
- The story of a pentester recruitment http://blog.silentsignal.eu/2015/04/03/the-story-of-a-pentester-recruitment/ 150 comments netsec
- How to got root access on FireEye OS http://blog.silentsignal.eu/2014/07/28/how-to-got-root-access-on-fireeye-os/ 7 comments netsec
- Trend Micro OfficeScan – A chain of bugs http://blog.silentsignal.eu/2014/06/06/trend-micro-officescan-a-chain-of-bugs/ 7 comments netsec
- From Read to Domain Admin – Abusing Symantec Backup Exec with Frida.RE http://blog.silentsignal.eu/2014/02/27/from-read-to-domain-admin-abusing-symantec-backup-exec-with-frida/ 16 comments netsec