René's URL Explorer Experiment


Title: Shellcode.Blog – Personal Computer Security Blog.

Description: Personal Computer Security Blog.

Open Graph Description: Personal Computer Security Blog.

direct link

Domain: shellcode.blog

NoneIE=edge
authorShellcode.Blog

Links:

Shellcode.Blog https://shellcode.blog/
Homehttps://shellcode.blog/
Githubhttps://github.com/M507
Postshttps://shellcode.blog/posts
Abouthttps://shellcode.blog/about
Inside CVE-2025-59287: SoapFormatter RCE in WSUShttps://shellcode.blog/wsus-cve-2025-59287-investigation/
Read Morehttps://shellcode.blog/wsus-cve-2025-59287-investigation/
LLM Hacking: Prompt Injectionhttps://shellcode.blog/llm1/
[1]https://owasp.org/www-project-top-10-for-large-language-model-applications/
Read Morehttps://shellcode.blog/llm1/
Insecure Active Directory Lab For Training (IaC)https://shellcode.blog/Vulnerable-AD-Lab-IaC/
Vulnerable-AD-Labhttps://github.com/M507/Vulnerable-AD-Lab
https://github.com/WazeHell/vulnerable-ADhttps://github.com/WazeHell/vulnerable-AD
Read Morehttps://shellcode.blog/Vulnerable-AD-Lab-IaC/
Hacking From the Sky - Penetration Testing UAVhttps://shellcode.blog/drone/
Read Morehttps://shellcode.blog/drone/
Using Cobalt Strike with Tunnel-Manager for Distributed Hackinghttps://shellcode.blog/Using-Cobalt-Strike-with-Tunnel-Manager-for-Distributed-Hacking/
Tunnel-Managerhttps://github.com/M507/Tunnel-Manager
Read Morehttps://shellcode.blog/Using-Cobalt-Strike-with-Tunnel-Manager-for-Distributed-Hacking/
Walkthrough: The detection and analysis of the ransomware incident in IRSeC 2021https://shellcode.blog/Walkthrough-Ransomware-Incident-IRSec/
Read Morehttps://shellcode.blog/Walkthrough-Ransomware-Incident-IRSec/
Mine for Local Privilege Escalation Vulnerabilities in Windows Applications Using Automation and Virtualizationhttps://shellcode.blog/Miner00/
GitHub Repositoryhttps://github.com/M507/Miner
Read Morehttps://shellcode.blog/Miner00/
Applied Purple Teaming Series ( Attack, Detect, & Defend ) Part 3https://shellcode.blog/Applied-Purple-Teaming-Series-P3/
Read Morehttps://shellcode.blog/Applied-Purple-Teaming-Series-P3/
Applied Purple Teaming Series ( Weaponize Windows ) Part 2https://shellcode.blog/Applied-Purple-Teaming-Series-P2/
Read Morehttps://shellcode.blog/Applied-Purple-Teaming-Series-P2/
Applied Purple Teaming Series ( The Virtual Environment ) Part 1https://shellcode.blog/Applied-Purple-Teaming-Series-P1/
Read Morehttps://shellcode.blog/Applied-Purple-Teaming-Series-P1/
Resource Efficient Internal Network Honeypotshttps://shellcode.blog/Resource-Efficient-Internal-Network-Honeypots/
Read Morehttps://shellcode.blog/Resource-Efficient-Internal-Network-Honeypots/
Studying Sysmon's Ability to Detect Process Injections Using Different Configuration Schemashttps://shellcode.blog/Studying_Sysmon_Ability_to_Detect_Process_Injections/
Redcanaryhttps://redcanary.com/threat-detection-report/techniques/process-injection/
Read Morehttps://shellcode.blog/Studying_Sysmon_Ability_to_Detect_Process_Injections/
6-Eyed-Spider Post-Exploitation Red-Team Toolhttps://shellcode.blog/6-Eyed-Spider/
Read Morehttps://shellcode.blog/6-Eyed-Spider/
Integrating C3 With Cobalt Strike via ExternalC2 And Studying Their Behaviorhttps://shellcode.blog/Integrating-C3-With-Cobalt-Strike/
Read Morehttps://shellcode.blog/Integrating-C3-With-Cobalt-Strike/
Windows Exploit Development: Egg Huntinghttps://shellcode.blog/Windows-Exploitation-Egg-hunting/
Read Morehttps://shellcode.blog/Windows-Exploitation-Egg-hunting/
Windows Exploit Development: Unicode and Venetian shellcode techniqueshttps://shellcode.blog/Writing_Unicode_Payloads/
Read Morehttps://shellcode.blog/Writing_Unicode_Payloads/
Detecting Bugs Using Network Protocol Fuzzinghttps://shellcode.blog/Detecting_Bugs_Using_Network_Protocol_Fuzzing_Boofuzz/
Read Morehttps://shellcode.blog/Detecting_Bugs_Using_Network_Protocol_Fuzzing_Boofuzz/
Windows Exploit Development: Utilizing imported functions (WinExec)https://shellcode.blog/Utilizing_imported_functions_WinExec/
Read Morehttps://shellcode.blog/Utilizing_imported_functions_WinExec/
Manually Encode Bytes & Shellcode Carvinghttps://shellcode.blog/Shellcode-Encoding/
Read Morehttps://shellcode.blog/Shellcode-Encoding/
DHCP Infrastructure Security: Practical Implementation of DHCP Starvation & DHCP Spoofinghttps://shellcode.blog/DHCP_Infrastructure_Security_DHCP_Starvation_DHCP_Spoofing/
Read Morehttps://shellcode.blog/DHCP_Infrastructure_Security_DHCP_Starvation_DHCP_Spoofing/
https://shellcode.blog/cdn-cgi/l/email-protection#97faf8fff6f3a4a4f4e4d7f0faf6fefbb9f4f8fa
https://github.com/M507/
https://www.linkedin.com/in/mohad33/
https://www.twitter.com/mohadsec

Viewport: width=device-width, initial-scale=1.0, maximum-scale=1.0


URLs of crawlers that visited me.