About Ciuffy
The average internet nonconformist guy. Classical musician and IT student, blogger wannabe. @Ciuffysrise ciuffysrise@gmail.com
- Location: Italy
- Website: ciuffysblog.blogspot.it
Ciuffy's Latest Posts
How To: Android CyanogenMod Kernel Building: Monitor Mode on Any Android Device with a Wireless Adapter
How To: Defeating HSTS and Bypassing HTTPS with DNS Server Changes and MITMf
How To: Attack on Stack [Part 6]; Smash the Stack Visualization: NOP Sled Technique, the End of a Trilogy.
How To: Attack on Stack [Part 5]; Smash the Stack Visualization: Remote Code Execution and Shellcode Concept.
How To: Attack on Stack [Part 4]; Smash the Stack Visualization: Prologue to Exploitation Chronicles, GDB on the Battlefield.
How To: Attack on Stack [Part 3]; Smash the Stack Visualization: Building on Fundaments, Analyzation Trilogy Conclusion.
How To: Attack on Stack [Part 2]; Smash the Stack Visualization: Ebp, Esp, RET and Stack Frames.
How To: Attack on Stack [Part 1]; Smash the Stack Visualization: Introduction to Memory, Registers and Assembly.
How To: Rooted Android = Your New PenTesting Tool
Forum Thread : Why, Where and How to Start Programming and Approach to Hacking.
Recently, we've been having requests and answers which needed a basic knowledge of programming languages to be fully understood. Sometimes starting studying programming languages can be seen as a long and tedious process, particularly when people discover hacking and try some ...more
How To: Kali Is Your New Pet; The Ultimate Guide About Kali Linux Portability.
SSH the World: Mac, Linux, Windows, iDevices and Android.
How To: Binary Patching. The Brute Force of Reverse Engineering with IDA and Hopper (And a Hex Editor).
How To: iDevice Jailbroken = Your New PenTesting Tool.
Subterfuge: MITM Automated Suite That Looks Just Lame.
How To: BeEF+Ettercap:Pwning Marriage
Next Page
Prev Page
Sites
- Hot
- Latest
-
News: The Cruel Crypto Game; How to Beat CryptoLocker Ransomware
-
How To: Android CyanogenMod Kernel Building: Monitor Mode on Any Android Device with a Wireless Adapter
-
How To: Defeating HSTS and Bypassing HTTPS with DNS Server Changes and MITMf
-
How To: Attack on Stack [Part 6]; Smash the Stack Visualization: NOP Sled Technique, the End of a Trilogy.
-
How To: Attack on Stack [Part 5]; Smash the Stack Visualization: Remote Code Execution and Shellcode Concept.
-
How To: Attack on Stack [Part 4]; Smash the Stack Visualization: Prologue to Exploitation Chronicles, GDB on the Battlefield.
-
How To: Attack on Stack [Part 3]; Smash the Stack Visualization: Building on Fundaments, Analyzation Trilogy Conclusion.
-
How To: Attack on Stack [Part 2]; Smash the Stack Visualization: Ebp, Esp, RET and Stack Frames.
-
How To: Attack on Stack [Part 1]; Smash the Stack Visualization: Introduction to Memory, Registers and Assembly.
-
How To: Rooted Android = Your New PenTesting Tool
-
Forum Thread: Why, Where and How to Start Programming and Approach to Hacking. 11 Replies
9 yrs ago -
How To: Kali Is Your New Pet; The Ultimate Guide About Kali Linux Portability.
-
SSH the World: Mac, Linux, Windows, iDevices and Android.
-
How To: Binary Patching. The Brute Force of Reverse Engineering with IDA and Hopper (And a Hex Editor).
-
How To: iDevice Jailbroken = Your New PenTesting Tool.
-
Subterfuge: MITM Automated Suite That Looks Just Lame.
-
How To: BeEF+Ettercap:Pwning Marriage
-
How To: Android CyanogenMod Kernel Building: Monitor Mode on Any Android Device with a Wireless Adapter
-
How To: Defeating HSTS and Bypassing HTTPS with DNS Server Changes and MITMf
-
How To: Binary Patching. The Brute Force of Reverse Engineering with IDA and Hopper (And a Hex Editor).
-
How To: Rooted Android = Your New PenTesting Tool
-
How To: Attack on Stack [Part 2]; Smash the Stack Visualization: Ebp, Esp, RET and Stack Frames.
-
How To: iDevice Jailbroken = Your New PenTesting Tool.
-
How To: BeEF+Ettercap:Pwning Marriage
-
News: The Cruel Crypto Game; How to Beat CryptoLocker Ransomware
-
How To: Attack on Stack [Part 6]; Smash the Stack Visualization: NOP Sled Technique, the End of a Trilogy.
-
How To: Attack on Stack [Part 5]; Smash the Stack Visualization: Remote Code Execution and Shellcode Concept.
-
How To: Attack on Stack [Part 4]; Smash the Stack Visualization: Prologue to Exploitation Chronicles, GDB on the Battlefield.
-
How To: Attack on Stack [Part 3]; Smash the Stack Visualization: Building on Fundaments, Analyzation Trilogy Conclusion.
-
How To: Attack on Stack [Part 1]; Smash the Stack Visualization: Introduction to Memory, Registers and Assembly.
-
Forum Thread: Why, Where and How to Start Programming and Approach to Hacking. 11 Replies
9 yrs ago -
How To: Kali Is Your New Pet; The Ultimate Guide About Kali Linux Portability.
-
SSH the World: Mac, Linux, Windows, iDevices and Android.
-
Subterfuge: MITM Automated Suite That Looks Just Lame.