Ophir Harpaz's Blog
My Twenty-Twenty in Tweets
clock
7 min read -
Dec 30, 2020
My First Letter-Frequency Cryptanalysis
clock
5 min read -
Oct 22, 2020
2 Github Accounts 1 Computer - The Shortest Guide Possible
clock
2 min read -
Aug 28, 2020
FritzFrog: A New Generation of Peer-to-Peer Botnets
external-link
External Post -
Aug 19, 2020
Integer Overflow for the Perfectionist Beginner
clock
5 min read -
Jun 6, 2020
How Does SSH Port Forwarding Work?
clock
10 min read -
Apr 9, 2020
The Vollgar Campaign - MS-SQL Servers Under Attack
external-link
External Post -
Apr 1, 2020
Threats Making WAVs - Incident Response to a Cryptomining Attack
external-link
External Post -
Jan 13, 2020
Using Peewee's Expression to Perform Array Operations
clock
6 min read -
Dec 27, 2019
Call-For-Papers DOs and DON'Ts
clock
4 min read -
Dec 12, 2019
The Massive Propagation of the Smominru Botnet
external-link
External Post -
Sep 18, 2019
A Speed-Research on Windows Explorer's Auto-Completion
clock
5 min read -
Aug 9, 2019
The Nansh0u Campaign - Hackers Arsenal Grows Stronger
external-link
External Post -
May 29, 2019
Attaching to Windows Kernel with KDNET — a Short Guide
external-link
External Post -
Apr 25, 2019
IResponse to IEcnrypt
external-link
External Post -
Apr 5, 2019
MongoDB Basic Document Grouping
external-link
External Post -
Mar 28, 2019
From A to W — Character Conversion in Windows API
external-link
External Post -
Nov 21, 2018
A Summary of x86 String Instructions
external-link
External Post -
Jul 23, 2018
5+1 Reasons Why You Need to Go to REcon
external-link
External Post -
Jun 21, 2018
Put The Flags Out! — Hacking Minesweeper
external-link
External Post -
Apr 13, 2018
TrickBot’s Cryptocurrency Hunger — Tricking the Bitcoin Out of Wallets
external-link
External Post -
Feb 15, 2018
Installing IP Cameras or How I started monitoring my cats
external-link
External Post -
Jul 29, 2017