SBK Blog


  • Categories

  • About

  • Archives

  • Tags

  • Sitemap

  • Search
Post Tree
  • Books Notes
    • 大眾文學
        • 13 Reasons Why(漢娜的遺言)
        • Ferryman(擺渡人)
        • 華麗なる一族(華麗一族)
        • 鹿の王(鹿王)
        • The Outcast(被放逐的孩子)
        • Billy Lynn's Long Halftime Walk(半場無戰事)
        • 一億円のさようなら(一億元的分手費)
        • 未來
        • Origin(起源)
        • 82년생 김지영(82年生的金智英)
        • The Kite Runner(追風箏的孩子)
        • Das Parfum – Die Geschichte eines Mörders(香水)
        • Het Achterhuis(安妮日記)
        • Tuesdays with Morrie(最後14堂星期二的課)
    • 工具書
        • 活色生香的希臘神話
        • The Reckoning: Financial Accountability and the Rise and Fall of Nations(大查帳:掌握帳簿就是掌握權力,會計制度與國家興衰的故事)
        • Prisoner’s Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb(囚犯的兩難:賽局理論、數學天才馮紐曼,以及原子彈的謎題)
        • 日本神話:從創世神話到妖怪物語,奇巧、炫麗的神鬼世界
        • 北歐神話:神族、巨人、符文與世界之樹的冰火起源
        • 這才是真實的巴勒斯坦:以色列殖民、種族隔離下的抵抗與希望
        • 眭澔平地球長征之旅:有多遠走多遠
        • 烏克蘭的不可能戰爭:反抗,所以存在
        • 不為人知的都市傳說
        • 怖い絵(膽小別看畫)
        • 小說課之王:折磨讀者的祕密
        • 手繪圖解日本史:從上古到戰後,百則不可不知的日本歷史大事件一網打盡!
        • 無住之島:給臺灣青年世代居住正義的出路
        • Surveillance State: Inside China’s Quest to Launch a New Era of Social Control(監控國家:中國全力打造的數位烏托邦,一座不斷進化、從上到下集體共構的全景監獄)
    • 恐怖推理懸疑
        • 謎解きはディナーのあとで(推理要在晚餐後)
        • 砂の器(砂之器)
        • 怪談和尚の京都怪奇譚(京都怪奇談: 看遍怨靈、輪迴與冥界的愛恨嗔癡,日本高僧三木大雲親身遇見的「另一個世界」)
        • 日本恐怖實話:台日靈異交匯、鬼魅共襄盛舉;令人毛骨悚然的撞鬼怪談!
        • Hidden Pictures(詭畫連篇)
        • ゴメンナサイ(對不起)
        • ソロモンの偽証(所羅門的偽證-事件)
        • Choose Me(選擇)
        • The Puppet Show(歡迎觀賞殺人預告)
        • 変な家2 ~11の間取り図~(詭屋 2:11張平面圖)
    • 漫畫
        • Điện Biên Phủ(奠邊府戰歌)
        • cocoon コクーン(cocoon 繭:沖繩姬百合隊的血色青春)
    • 科幻
        • Vingt Mille Lieues sous les mers(海底兩萬里)
        • Do Androids Dream of Electric Sheep?(銀翼殺手)
        • Cat's Cradle(貓的搖籃)
        • タイム・リープ:あしたはきのう(時間跳躍的你來自昨日)
    • 純文學
        • 人間失格
        • L'Etranger(異鄉人)
        • Die Leiden des jungen Werthers(少年維特的煩惱)
        • 色彩を持たない多崎つくると、彼の巡礼の年(沒有色彩的多崎作和他的巡禮之年)
        • 傾城之戀【張愛玲百歲誕辰紀念版】:短篇小說集一 1943年
        • The Decameron (十日談)
        • Jane Eyre (簡愛)
        • ノルウェイの森(挪威的森林)
        • Pride and Prejudice(傲慢與偏見)
        • The Moon and Sixpence(月亮與六便士)
        • The Heart of The Matter(事物的核心)
  • Data Structure
      • Lecture 2
      • Lecture 4
      • Lecture 6
      • Lecture 8
      • Data Structure
      • Lecture 10
  • Job
    • Interview
        • TeamT5筆試題目筆記
        • Trapa Interview
  • Knowledge
      • AI Prompt
      • English Writing Vocabulary
      • 日本知名的漫畫相關獎項
      • 投資理財
      • 動漫出版社
  • LeetCode
    • Easy
        • LeetCode - Two Sum
        • LeetCode - Valid Parentheses
        • Merge Two Sorted Lists
  • Problem Solutions
      • sudo chmod 777 -R /usr Problem
      • fatal: Authentication failed for https://github.com/{username}/{repository}.git/
      • CreateProcessEntryCommon:586: Create process not expected to return
      • Unexpected fatal error while initializing python runtime
      • VirtualBox滑鼠無法跳出
      • WSL tty /dev/tty0
      • zshrc & Initial Library
      • 寫論文參考的工具或影片
      • UiAutomatorViewer 常見問題整理
      • WSL2 Cannot List Android Devices
      • Problems About Multiprocess
      • MITMProxy相關問題整理
      • How to adjust Endnote's Paragraph in Word
      • Endnote - Invalid Citation
      • Git Large File Error - Solution
      • React Native - Error resolving plugin [id: com.facebook.react.settings]
      • How to address docker compose not found
      • How to set up DNS to request risked website
      • How to address filtering unicode in search.xml
  • Security
    • Competition
        • EOF AIS3 Final
        • AIS3 Pre-Exam 2023
        • CSC 2023 決賽
        • CGGC 2023 初賽
        • DEADFACE CTF 2023
        • PicoCTF 2023
        • 神盾盃2023初賽
        • AIS3 EOF 2023 初賽
        • BalsnCTF 2023
        • AIS3 EOF 2024
        • TSCCTF 2024
        • AIS3 Pre-Exam 2025
    • Course
      • NTU CNS
        • NTU CNS Final Project Proposal
        • Cryptography and Network Security - Final Project
        • Cryptography and Network Security – HW0
        • Cryptography and Network Security – Homework 1
        • Cryptography and Network Security – Homework 2
        • Cryptography and Network Security – Homework 3
        • Cryptography and Network Security - Regular Critique 2
        • Cryptography and Network Security – Comparative Critique 1
        • Cryptography and Network Security – Comparative Critique 2
        • Cryptography and Network Security – Comparative Critique 3
        • Cryptography and Network Security – Regular Critique 3
        • Cryptography and Network Security – Regular Critique 4
      • NTU CS
        • Simple Crypto - 0x01(Modular Operation)
        • Simple Crypto - 0x03(Lab - LFSR)
        • NTU CS 2023 HW1 Write Up
        • Simple Crypto - 0x03(2023 Lab - COR)
        • Simple Crypto - 0x04(2023 Lab - POA)
        • Simple Crypto - 0x05(2023 Lab - LSB)
        • Simple Crypto - 0x06(2023 HW - LFSR)
        • Simple Crypto - 0x07(2023 HW - Oracle)
        • Simple Crypto - 0x08(2023 Lab - dlog)
        • Simple Crypto - 0x09(2023 Lab - signature)
        • Simple Crypto - 0x10(2023 Lab - coppersmith)
        • Simple Crypto 0x11(2023 HW - invalid_curve_attack)
        • Simple Crypto 0x12(2023 HW - signature_revenge)
        • Simple Crypto 0x13(2023 HW - Power Analysis)
        • Simple Crypto - 0x02(Random Number Generator - LCG)
        • Simple Buffer Overflow - 0x00
        • Simple Buffer Overflow - 0x02
        • Simple Buffer Overflow - 0x01
        • Simple Buffer Overflow - 0x05(Leak Canary)
        • Simple PWN - 0x07(ROP)
        • Simple PWN - 0x08(one_gadget with ROP)
        • Simple PWN - 0x14(Simple HEAP)
        • Simple PWN 0x17(UAF - leak information)
        • Simple PWN 0x19(Lab - `babyums` - flag 1)
        • Simple Buffer Overflow - 0x04
        • Simple PWN - 0x06(GOT hijacking/Lab - `got2win`)
        • Simple PWN - 0x09(stack pivoting)
        • Simple PWN - 0x10(`seccomp`/Lab - `rop2win`)
        • Simple PWN - 0x11(format string bug)
        • Simple PWN - 0x12(Lab - `rop++`)
        • Simple PWN - 0x13(Lab - `how2know`)
        • Simple PWN - 0x15(Lab - `heapmath`)
        • Simple PWN 0x16(simple_smallbin)
        • Simple PWN 0x18(Lab - `babynote`)
        • Simple PWN 0x20(Lab - `babyums` - flag 2)
        • Simple PWN 0x21(fopen, fread, fwrite, fclose)
        • Simple PWN 0x22(Lab - `AAR`)
        • Simple PWN 0x23(Lab - `AAW`)
        • NTU CS 2023 HW3 Write Up
        • Simple PWN 0x31(2023 HW - Notepad - Stage - 1)
        • Simple PWN 0x32(2023 HW - Notepad-Stage 2)
        • Simple PWN 0x33(2023 Lab - ROP_RW)
        • Simple PWN 0x34 (2023 Lab - ret2plt)
        • Simple PWN 0x35(2023 Lab - Stack Pivot)
        • Simple PWN 0x36(2023 HW - Notepad-Stage 3)
        • Simple PWN 0x37(2023 HW - HACHAMA)
        • Simple PWN 0x38(Lab - UAF)
        • Simple PWN 0x39(Lab - Double Free)
        • Simple PWN 0x40(2023 HW - UAF++)
        • NTU CS 2023 HW2 Write Up
        • Simple Reverse - 0x03(Lab - Why)
        • Simple Reverse 0x06(Lab - AMessageBox)
        • Simple Reverse 0x08(Lab - GetProcAddress)
        • Simple Reverse 0x11(Lab - Exception)
        • Simple Reverse 0x12(Lab - TLSCallback)
        • Simple Reverse 0x13(Lab - Meow)
        • Simple Reverse - 0x14(2023 Lab - AssemblyDev)
        • Simple Reverse - 0x15(2023 HW - crackme_vectorization)
        • Simple Reverse - 0x26(2023 HW - Banana Donut Verifier)
        • Simple Reverse - 0x27(2023 Lab - Scramble)
        • Simple Reverse - 0x28(2023 Lab - Super Angry)
        • Simple Reverse - 0x29(2023 Lab - Unpackme)
        • Simple Reverse - 0x30(2023 HW - Evil FlagChecker)
        • Simple Reverse - 0x01(Lab - Sacred Arts)
        • Simple Reverse - 0x16(2023 Lab - WinMalware - sub_140001C80)
        • Simple Reverse - 0x17(2023 Lab - WinMalware - sub_140001030)
        • Simple Reverse - 0x18(2023 Lab - WinMalware - sub_140001120)
        • Simple Reverse - 0x19(2023 Lab - WinMalware - Extract Next Stage Payload)
        • Simple Reverse - 0x20(2023 Lab - WinMalware - Extract Next Stage Payload - 2)
        • Simple Reverse - 0x21(2023 Lab - WinMalware - Extract Next Stage Payload - 3)
        • Simple Reverse - 0x22(2023 Lab - WinMalware - Collect)
        • Simple Reverse - 0x23(2023 Lab - WinMalware - Exfiltrate)
        • Simple Reverse - 0x24(2023 Lab - WinMalware - Dynamic API Resolution Background)
        • Simple Reverse - 0x25(2023 Lab - WinMalware - 作業)
        • Simple Reverse 0x30(2023 HW - Baby Ransom 1)
        • Simple Reverse 0x31(2023 HW - Baby Ransom 2)
        • Simple Web 0x01(Lab - Hello from Windows 98)
        • Simple Web 0x16(Lab - Pickle)
        • Simple Web 0x17(Lab - Baby Cat)
        • Simple Web 0x23(Lab - XXE)
        • Simple Web - 0x02(Lab - Whois Tool)
        • Simple Web - 0x03(Lab - Normal Login Panel (Flag 1))
        • Simple Web - 0x04(Lab - Normal Login Panel (Flag 2))
        • Simple Web - 0x08(Lab - `Particles.js`)
        • Simple Web - 0x09(Lab - Simple Note)
        • Simple Web 0x18(Lab - Magic Cat)
        • Simple Web 0x12(Lab - Web Preview Card)
        • NTU CS 2023 HW4 Write Up
        • Simple Web 0x42(2023 HW - Double Injection - FLAG2)
        • Simple Web 0x41(2023 HW - Double Injection - FLAG1)
        • Simple Welcome - 0x04(Lab - Script)
        • NTU CS HW0 Write Up
        • Simple Welcome 0x01(Lab - Let's meet at class)
        • Simple Welcome 0x02 & 0x05(Lab - Nine & Nine-Revenge)
      • NTU CT
        • NTU Compiler Technology Project 2
        • NTU Compiler Technology Project 3
        • NTU Compiler Technology Project 1
        • NTU Compiler Technology Previous Exam 2019 Spring
        • NTU Compiler Technology Previous Exam 2020 Spring
        • NTU Compiler Technology Project 4
      • NTU Crypto
        • Cryptography Lec 2(Historical Ciphers) - Notes
        • Cryptography Lec 1(Overview) - Notes
        • Cryptography Lec 3(Mathematical Background) - Notes
        • Cryptography Lec 4(Information Theory) - Notes
        • Cryptography Lec 5(Symmetric Key Cryptography) - Notes
        • Cryptography Lec 6(Key Agreement Protocol) - Notes
      • NTU ML
        • NTU Machine Learning Final Project Proposal Notes
        • NTU Machine Learning Final Project Proposal Notes
        • Machine Learning Hand-write Homework & Answer
        • NTU Machine Learning Homework 1
        • NTU Machine Learning Homework 2
      • NTU MR
        • NTU Malware Reverse Lab 2 write up
        • NTU Malware Reverse HW 1 write up
        • NTU Malware Reverse HW 2 write up
        • NTU Malware Reverse HW 3 write up
        • NTU Malware Reverse Lab 1 write up
        • NTU Malware Reverse Lab 3 write up
        • NTU Malware Reverse Final Project Notes
      • NTU OS
        • NTU Operating System Project 1
        • NTU Operating System Project 2
        • NTU Operating System Project 3
        • NTU Operating System Review Notes
      • NTU PADNS
        • A&D of Network Security - Lab 2
        • A&D of Network Security Note
        • A&D of Network Security - Lab 7
        • A&D of Network Security - Lab 12
        • A&D of Network Security - Lab 3
        • A&D of Network Security - Lab 13
        • A&D of Network Security - Lab 14
        • A&D of Network Security - Lab 4(ARP & DNS SPOOFING)
      • NTU ST
        • Unit Test Practice
        • NTU Software Testing Notes
        • NTU Software Testing Notes
      • NTUST ISC
        • NTUSTISC - AD Note - Lab(查詢本地使用者)
        • NTUSTISC - AD Note(Lab - 查詢網域使用者)
        • NTUSTISC - AD Note - Lab(Leak Password)
        • NTUSTISC - AD Note - Lab(偵測查詢的操作)
        • NTUSTISC - AD Note - Lab(查詢網域群組)
        • NTUSTISC - AD Note - Lab(當前網域控制站(DC))
        • NTUSTISC - AD Note - Lab(環境調查BloodHound)
        • NTUSTISC - AD Note - Lab(利用弱點)
        • NTUSTISC - AD Note - Lab(Hijack Token)
        • NTUSTISC - AD Note - Lab(偵測提權)
        • NTUSTISC - AD Note - Lab(錯誤配置)
        • NTUSTISC - AD Note - 環境建置 & Background
        • NTUSTISC - AD Note - 會後提及有用的工具
        • NTUSTISC - AD Note - Lab(Brute Force SAM)
        • NTUSTISC - AD Note - Lab(Password Spraying)
        • NTUSTISC - AD Note - Lab(偵測密碼揮灑)
        • NTUSTISC - AD Note - Lab(透過Mimikatz取得Local Admin的NTLM)
        • NTUSTISC - AD Note - Lab(偵測LSASS)
        • NTUSTISC - AD Note - Lab(其他方法得到lsass.dmp)
        • NTUSTISC - AD Note - Lab(顯示Mimikatz的明文)
        • NTUSTISC - AD Note - Lab(無法Reboot的時盜取Passwd)
        • NTUSTISC - AD Note - Lab(AS-REP Roasting)
        • NTUSTISC - AD Note - Lab(遠端執行(RDP))
        • NTUSTISC - AD Note - Lab(遠端執行(RDP)2)
        • NTUSTISC - AD Note - Lab(SMB遠端讀寫)
      • NTUST WS
        • Simple Web 0x24(Lab - how2http)
        • Simple Web 0x09(Lab - DNS Lookup Tool)
        • Simple Web 0x10(Lab - DNS Lookup Tool | WAF)
        • Simple Web 0x15.5(Pickle)
        • Simple Web 0x16(Lab - Pickle)
        • Simple Web 0x16.5(php unserialize)
        • Simple Web 0x17(Lab - Baby Cat)
        • Simple Web 0x23(Lab - XXE)
        • Simple Web 0x18(Lab - Magic Cat)
        • Simple Web 0x11(Lab - XSS Me)
        • Simple Web 0x01(Lab - `gitleak`)
        • Simple Web 0x02(Lab - `.DS_Store`)
        • Simple Web 0x07(Lab - `HakkaMD`)
        • Simple Web 0x08(Lab - My First Meow Website)
        • Simple Web 0x19(Lab - PHP Login)
        • Simple Web 0x03(Lab - Log me in + Revenge)
        • Simple Web 0x13(Lab - SSRFrog)
        • Simple Web 0x14(Lab - Debug)
        • Simple Web 0x12(Lab - Web Preview Card)
        • Simple Web 0x22(Lab - Pug)
        • Simple Web 0x15(Lab - `Jinja`)
        • Simple Web 0x04(Lab - Image Space 0x01)
        • Simple Web 0x05(Lab - Image Space 0x02)
        • Simple Web 0x06(Lab - Image Space 0x03)
      • Tai.HolyHigh
        • TaiwanHolyHigh - SoC基礎維運 - ArcSight教學
        • TaiwanHolyHigh - SoC基礎維運 - HW2
        • TaiwanHolyHigh - Windows Forensics - $MFT Background
        • TaiwanHolyHigh - Windows Forensics - $MFT Resident / Non-Resident File
        • TaiwanHolyHigh - Windows Forensics - $MFT 基本實作
        • TaiwanHolyHigh - Windows Forensics - Background
        • TaiwanHolyHigh - Windows Forensics - LNK Lab
        • TaiwanHolyHigh - Windows Forensics - Windows Artifacts
        • TaiwanHolyHigh - Windows Forensics - Windows檔案系統與還原
    • Practice
      • Adworld
        • Adworld - pure_color
        • Adworld - 心儀的公司
        • Adworld - 適合作為桌面
        • Adworld - 3-1
        • Adworld - Misc文件類型
        • Adworld - miao~
      • BTLO
        • BTLO - Meta
        • BTLO - Shiba Insider
        • BTLO - Bruteforce
        • BTLO - Follina
        • BTLO - Log Analysis -Compromised WordPress
        • BTLO - Paranoid
        • BTLO - Secrets
        • BTLO - Phishing Analysis
      • CrewCTF
        • CrewCTF - :-1: Questions
        • CrewCTF - Attaaaaack 1-13
        • CrewCTF - Encrypt10n(Part 1)
        • CrewCTF - Encrypt10n(Part 2)
        • CrewCTF - OhPHP
        • CrewCTF - ez rev
        • CrewCTF - sequence_gallery
      • CyberDefender
        • CyberDefender - KrakenKeylogger
        • CyberDefender - BlackEnergy
        • CyberDefender - RedLine
        • CyberDefender - Spotlight
        • CyberDefender - CorporateSecrets (Part 1)
        • CyberDefender - CorporateSecrets (Part 2)
        • CyberDefender - CorporateSecrets (Part 3)
        • CyberDefender - CorporateSecrets (Part 4)
        • CyberDefender - Hunter (Part 1)
        • CyberDefender - Hunter (Part 2)
        • CyberDefender - Hunter (Part 3)
        • CyberDefender - MrRobot - POS
        • NTUSTISC - CyberDefender - MrRobot - Target 1
        • CyberDefender - MrRobot - Target 2
        • CyberDefender - Szechuan Sauce (Part 1)
        • CyberDefender - Szechuan Sauce (Part 2)
        • CyberDefender - PoisonedCredentials
        • CyberDefender - PsExec Hunt
        • CyberDefender - Tomcat Takeover
        • CyberDefender - WebStrike
        • CyberDefender - GrabThePhisher
        • CyberDefender - Intel101
        • CyberDefender - L'espion
      • HackTheBox
        • HackTheBox
      • NISRA
        • NISRA - Hidden?
        • Background
        • NISRA 2023 Enlightened - Jack的flag
        • NISRA 2023 Enlightened - Magic Function
        • NISRA 2023 Enlightened - Pixel
        • NISRA - different places
        • NISRA - MD5_1
        • NISRA - MD5_2
      • PicoCTF
        • PicoCTF - Easy Peasy Or Bad Questions
        • PicoCTF - Compress and Attack
        • PicoCTF - Easy Peasy
        • PicoCTF - New Caesar
        • PicoCTF - Sequences
        • PicoCTF - XtraORdinary
        • PicoCTF - Double DES
        • PicoCTF - AES-ABC
        • PicoCTF - Mind your Ps and Qs
        • PicoCTF - Mini RSA
        • PicoCTF - No Padding, No Problem
        • PicoCTF - It's Not My Fault 1
        • PicoCTF - Dachshund Attacks
        • PicoCTF - SRA
        • PicoCTF - Scrambled: RSA
        • PicoCTF - Very Smooth
        • PicoCTF - corrupt-key-1
        • PicoCTF - NSA Backdoor
        • PicoCTF - john_pollard
        • PicoCTF - PowerAnalysis Part 1 / Part 2
        • PicoCTF - PW Crack 4
        • PicoCTF - Special & Specialer
        • PicoCTF - flag_shop
        • PicoCTF - mus1c
        • PicoCTF - information
        • PicoCTF - Surfing the Waves
        • PicoCTF - Sleuthkit Intro
        • PicoCTF - Disk, disk, sleuth! II
        • PicoCTF - Pitter, Patter, Platters
        • PicoCTF - Operation Oni
        • PicoCTF - Operation Orchid
        • PicoCTF - `Wireshark doo dooo do doo...`
        • PicoCTF - Trivial Flag Transfer Protocol
        • PicoCTF - Wireshark twoo twooo two twoo...
        • PicoCTF - shark on wire 1
        • PicoCTF - WPA-ing Out
        • PicoCTF - Eavesdrop
        • PicoCTF - Torrent Analyze
        • PicoCTF - WebNet0
        • PicoCTF - scrambled-bytes
        • PicoCTF - shark on wire 2
        • PicoCTF - Matryoshka doll
        • PicoCTF - MacroHard WeakEdge
        • PicoCTF - File types
        • PicoCTF - WhitePages
        • PicoCTF - like1000
        • PicoCTF - Investigative Reversing 0
        • PicoCTF - SideChannel
        • PicoCTF - `tunn3l v1s10n`
        • PicoCTF - advanced-potion-making
        • PicoCTF - m00nwalk
        • PicoCTF - c0rrupt
        • PicoCTF - m00nwalk2
        • PicoCTF - Guessing Game 1
        • PicoCTF - Guessing Game 2
        • PicoCTF - Kit Engine
        • PicoCTF - RPS
        • PicoCTF - SaaS
        • PicoCTF - Stonk Market
        • PicoCTF - Unsubscriptions Are Free
        • PicoCTF - VNE
        • PicoCTF - babygame01
        • PicoCTF - babygame02
        • PicoCTF - buffer overflow 2
        • PicoCTF - fermat-strings
        • PicoCTF - filtered-shellcode
        • PicoCTF - flag leak
        • PicoCTF - function overwrite
        • PicoCTF - hijacking
        • PicoCTF - ropfu
        • PicoCTF - seed-sPRiNG
        • PicoCTF - stack cache
        • PicoCTF - tic-tac
        • PicoCTF - two-sum
        • PicoCTF - x-sixty-what
        • PicoCTF - Transformation
        • PicoCTF - ARMssembly 0
        • PicoCTF - Easy as GDB
        • PicoCTF - Forky
        • PicoCTF - Let's get dynamic
        • PicoCTF - No way out
        • PicoCTF - OTP Implementation
        • PicoCTF - Picker III
        • PicoCTF - Powershelly
        • PicoCTF - Wizardlike
        • PicoCTF - asm4
        • PicoCTF - droids1
        • PicoCTF - droids3
        • PicoCTF - droids4
        • PicoCTF - gogo
        • PicoCTF - not crypto
        • PicoCTF - SQLiLite
        • PicoCTF - Insp3ct0r
        • PicoCTF - Scavenger Hunt
        • PicoCTF - Cookies
        • PicoCTF - dont-use-client-side
        • PicoCTF - It is my Birthday
        • PicoCTF - Some Assembly Required 1
        • PicoCTF - Who are you?
        • PicoCTF - Some Assembly Required 2
        • PicoCTF - Super Serial
        • PicoCTF - caas
        • PicoCTF - Secrets
        • PicoCTF - JAUTH
        • PicoCTF - JaWT Scratchpad
        • PicoCTF - Java Code Analysis!?!
        • PicoCTF - Java Script Kiddie
        • PicoCTF - More SQLi
        • PicoCTF - Some Assembly Required 3
        • PicoCTF - notepad
        • PicoCTF - Most Cookies
      • Portswigger Web Security Academy
        • CSRF - APPRENTICE
        • Lab: CSRF where token is tied to non-session cookie
        • Lab: CSRF where token is not tied to user session
        • Lab: CSRF where token validation depends on request method
        • Lab: CSRF where token validation depends on token being present
        • Deserialization - APPRENTICE
        • Lab: Arbitrary object injection in PHP
        • Lab: Modifying serialized data types
        • Lab: Exploiting Java deserialization with Apache Commons
        • Lab: Using application functionality to exploit insecure deserialization
        • Lab: SQL injection UNION attack, determining the number of columns returned by the query
        • Lab: SQL injection UNION attack, finding a column containing text
        • Lab: SQL injection UNION attack, retrieving data from other tables
        • Lab: SQL injection UNION attack, retrieving multiple values in a single column
        • Lab: SQL injection attack, listing the database contents on Oracle
        • Lab: SQL injection attack, listing the database contents on non-Oracle databases :four:
        • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
        • Lab: SQL injection attack, querying the database type and version on Oracle
        • SQLi - APPRENTICE
        • Lab: DOM XSS in `document.write` sink using source `location.search` inside a select element
        • Lab: Stored DOM XSS
        • XSS - APPRENTICE
        • Lab: Exploiting XXE via image file upload
        • Lab: Exploiting `XInclude` to retrieve files
        • XXE - APPRENTICE
        • Lab: Blind XXE with out-of-band interaction via XML parameter entities
        • Lab: Blind XXE with out-of-band interaction
        • Lab: Exploiting blind XXE to exfiltrate data using a malicious external DTD
        • Lab: Exploiting blind XXE to retrieve data via error messages
  • Side Project
      • A Hybrid Facial Expression Recognition System Based on Facial Features and Pose Estimation
      • Special Topic of Tzu-Chi at TCIVS
      • side_project_lightbulb_control
      • side_project_weibo_hot
  • Survey Papers
    • Android + Security
        • A Mitmproxy-based Dynamic Vulnerability Detection System For Android Applications
        • Exploiting ML ALG for Efficient Detection and Prevention of JS-XSS Attacks in Android Based Hybrid Applications
        • Uncovering Intent based Leak of Sensitive Data in Android Framework
        • Understanding Real-world Threats to Deep Learning Models in Android Apps
        • WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
        • Cross-site Scripting Attacks on Android Hybrid Applications
        • A MITM Based Penetration Test Efficiency Improvement Approach for Traffic-Encrypted Mobile Apps of Power Industry
        • VAPTAi: A Threat Model for Vulnerability Assessment and Pentesting of Android and iOS Mobile Banking Apps
        • Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
      • GUI Testing
        • Fastbot: A Multi-Agent Model-Based Test Generation System
        • Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement Learning
      • Tool
        • Pentest Tools Survey
        • 有關Pentest但貢獻很爛的三篇論文
    • Crypto
        • How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update - Notes
    • Digital Currency
        • The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support - Notes
    • Federated Learning
        • EIFFeL: Ensuring Integrity For Federated Learning - Notes
        • FedML-HE - An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System - Notes
        • Local Model Poisoning Attacks to Byzantine-Robust Federated Learning - Notes
    • ML-DL + Security
        • DEEPCASE Semi-Supervised Contextual Analysis of Security Events - Notes
        • DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
  • Terminology
      • What is DevOps, MLOps, CI/CD?
      • What is IDS, IPS, EDR, MDR, NSM, SIEM?
      • Linux Related
      • Network Related
      • Node Related
      • Android Related
      • /wp-admin VS /wp-content VS /wp-include VS /wp-json
      • Reinforcement Learning
      • Math Related
      • Programming Related
  • Tools
    • CTF
        • Forensics Cheat Sheet
        • Misc Cheat Sheet
        • PWN Overview
        • Reverse Overview
        • 利用Metasploit Framework測試一些網站
        • Web Cheat Sheet
        • Crypto Cheat Sheet
        • All Pentest Tools
    • Others
        • $\LaTeX$ 語法筆記
        • Command Cheat Sheet
        • Useful Link
        • Real World Tools
        • Docker Cheat Sheet
        • 有問題的網站
      • Android App Crawler
        • App Crawler Overview
        • Fastbot Android
        • App Crawler 無法使用紀錄
        • AppCrawler
        • Maxim
        • Droidbot
      • Android Related
        • Drozer Cheat Sheet
        • Test DIVA - activity exported
        • Test DIVA - content provider exported - DB Based
        • Test Sieve - activities exported
        • Test Sieve - broadcast receivers exported
        • Test Sieve - content providers exported - DB Based
        • Test Sieve - content providers exported - File SystemBased
        • Test Sieve - is debuggable
        • Test Sieve - services exported
        • Drozer/MobSF Installation
        • Test Sieve by MobSF
      • Directory Fuzzing - Traversal Tools
        • Directory Fuzzing/Traversal Tools
        • WFuzz
  • Trip
      • 2025日本自由行
  • Tutorial
      • How to install LogonTracer
      • How to use VScode / Web Storm Debug JS
      • pwndbg installation problems
      • How to use ZAP/Burp Suite/mitmproxy as Proxy for Android
      • How to check if the paper is Top Conference or Q1 Journal
      • How to Root Android Phone and Install AlwaysTrustUserCert.zip Module
      • How to install aab file
      • How to use Mailgun/Resend as SMTP server
      • How to build apk file on React-Native Project
      • How to download blob videos
      • 如何使用Hugo+Github架設網站
      • 如何使用Jekyll架設Blog
      • Add Third-Party Service to Jekyll
      • Add Custom Sidebar to Left Side
  • 原始文章
      • Categories
      • Elements
      • Link Post
      • Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam justo turpis, tincidunt ac convallis id.
      • Tags
      • 中文測試
      • 日本語テスト
      • Block
      • Excerpts
      • Images
      • MathJax with Jekyll
      • Gallery Post
      • Emoji Test
      • Highlight Test
      • Next Theme Tutorial

Category

Next Theme Tutorial

07-20

Highlight Test

07-19

Emoji Test

09-19

MathJax with Jekyll

02-16

Images

12-26

Excerpts

12-25

Block

12-25

日本語テスト

12-24

中文測試

12-24

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aliquam justo turpis, tincidunt ac convallis id.

12-24

Categories

12-24

Link Post

12-24

Tags

12-24

Elements

12-24

The Heart of The Matter(事物的核心)

09-19

The Moon and Sixpence(月亮與六便士)

08-12

Pride and Prejudice(傲慢與偏見)

07-17

ノルウェイの森(挪威的森林)

07-03

Jane Eyre (簡愛)

04-04

The Decameron (十日談)

03-17

傾城之戀【張愛玲百歲誕辰紀念版】:短篇小說集一 1943年

04-24

色彩を持たない多崎つくると、彼の巡礼の年(沒有色彩的多崎作和他的巡禮之年)

08-30

Die Leiden des jungen Werthers(少年維特的煩惱)

03-08

L'Etranger(異鄉人)

02-25

人間失格

01-25

Tuesdays with Morrie(最後14堂星期二的課)

10-05

Het Achterhuis(安妮日記)

09-27

Das Parfum – Die Geschichte eines Mörders(香水)

08-27

The Kite Runner(追風箏的孩子)

08-16

82년생 김지영(82年生的金智英)

08-02

Origin(起源)

07-15

未來

07-14

一億円のさようなら(一億元的分手費)

07-07

Billy Lynn's Long Halftime Walk(半場無戰事)

05-29

The Outcast(被放逐的孩子)

08-26

鹿の王(鹿王)

08-23

華麗なる一族(華麗一族)

08-15

Ferryman(擺渡人)

07-14

13 Reasons Why(漢娜的遺言)

02-24

Surveillance State: Inside China’s Quest to Launch a New Era of Social Control(監控國家:中國全力打造的數位烏托邦,一座不斷進化、從上到下集體共構的全景監獄)

10-10

無住之島:給臺灣青年世代居住正義的出路

10-05

手繪圖解日本史:從上古到戰後,百則不可不知的日本歷史大事件一網打盡!

09-21

小說課之王:折磨讀者的祕密

09-13

怖い絵(膽小別看畫)

07-30

不為人知的都市傳說

07-21

烏克蘭的不可能戰爭:反抗,所以存在

05-30

眭澔平地球長征之旅:有多遠走多遠

04-15

這才是真實的巴勒斯坦:以色列殖民、種族隔離下的抵抗與希望

06-11

北歐神話:神族、巨人、符文與世界之樹的冰火起源

06-09

日本神話:從創世神話到妖怪物語,奇巧、炫麗的神鬼世界

01-10

Prisoner’s Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb(囚犯的兩難:賽局理論、數學天才馮紐曼,以及原子彈的謎題)

05-06

The Reckoning: Financial Accountability and the Rise and Fall of Nations(大查帳:掌握帳簿就是掌握權力,會計制度與國家興衰的故事)

03-15

活色生香的希臘神話

02-24

タイム・リープ:あしたはきのう(時間跳躍的你來自昨日)

09-09

Cat's Cradle(貓的搖籃)

08-04

Do Androids Dream of Electric Sheep?(銀翼殺手)

06-04

Vingt Mille Lieues sous les mers(海底兩萬里)

03-01

NTU Software Testing Notes

11-16

NTU Software Testing Notes

11-14

Unit Test Practice

10-23

side_project_weibo_hot

11-29

side_project_lightbulb_control

11-09

Special Topic of Tzu-Chi at TCIVS

11-09

A Hybrid Facial Expression Recognition System Based on Facial Features and Pose Estimation

11-09

NTU Compiler Technology Project 4

12-26

NTU Compiler Technology Previous Exam 2020 Spring

12-19

NTU Compiler Technology Previous Exam 2019 Spring

12-17

NTU Compiler Technology Project 1

12-16

NTU Compiler Technology Project 3

11-20

NTU Compiler Technology Project 2

11-14

NTU Operating System Review Notes

12-22

NTU Operating System Project 3

12-04

NTU Operating System Project 2

11-20

NTU Operating System Project 1

11-14

NTU Malware Reverse Final Project Notes

12-27

NTU Malware Reverse Lab 3 write up

12-23

NTU Malware Reverse Lab 1 write up

12-16

NTU Malware Reverse HW 3 write up

12-16

NTU Malware Reverse HW 2 write up

12-08

NTU Malware Reverse HW 1 write up

12-08

NTU Malware Reverse Lab 2 write up

11-15

NTU Machine Learning Homework 2

01-16

NTU Machine Learning Homework 1

01-16

Machine Learning Hand-write Homework & Answer

01-16

NTU Machine Learning Final Project Proposal Notes

12-28

NTU Machine Learning Final Project Proposal Notes

11-16

Simple PWN 0x40(2023 HW - UAF++)

01-31

Simple PWN 0x39(Lab - Double Free)

01-31

Simple PWN 0x38(Lab - UAF)

01-31

Simple PWN 0x37(2023 HW - HACHAMA)

01-31

Simple PWN 0x36(2023 HW - Notepad-Stage 3)

01-31

Simple PWN 0x35(2023 Lab - Stack Pivot)

01-31

Simple PWN 0x34 (2023 Lab - ret2plt)

01-31

Simple PWN 0x33(2023 Lab - ROP_RW)

01-31

Simple PWN 0x32(2023 HW - Notepad-Stage 2)

01-31

Simple PWN 0x31(2023 HW - Notepad - Stage - 1)

01-31

NTU CS 2023 HW3 Write Up

01-31

Simple PWN 0x23(Lab - `AAW`)

01-29

Simple PWN 0x22(Lab - `AAR`)

01-29

Simple PWN 0x21(fopen, fread, fwrite, fclose)

01-29

Simple PWN 0x20(Lab - `babyums` - flag 2)

01-29

Simple PWN 0x18(Lab - `babynote`)

01-29

Simple PWN 0x16(simple_smallbin)

01-29

Simple PWN - 0x15(Lab - `heapmath`)

01-29

Simple PWN - 0x13(Lab - `how2know`)

01-29

Simple PWN - 0x12(Lab - `rop++`)

01-29

Simple PWN - 0x11(format string bug)

01-29

Simple PWN - 0x10(`seccomp`/Lab - `rop2win`)

01-29

Simple PWN - 0x09(stack pivoting)

01-29

Simple PWN - 0x06(GOT hijacking/Lab - `got2win`)

01-29

Simple Buffer Overflow - 0x04

01-29

Simple PWN 0x19(Lab - `babyums` - flag 1)

01-28

Simple PWN 0x17(UAF - leak information)

01-24

Simple PWN - 0x14(Simple HEAP)

01-19

Simple PWN - 0x08(one_gadget with ROP)

01-16

Simple PWN - 0x07(ROP)

01-16

Simple Buffer Overflow - 0x05(Leak Canary)

01-16

Simple Buffer Overflow - 0x01

01-16

Simple Buffer Overflow - 0x02

01-09

Simple Buffer Overflow - 0x00

01-08

Simple Web 0x41(2023 HW - Double Injection - FLAG1)

02-03

Simple Web 0x42(2023 HW - Double Injection - FLAG2)

01-31

NTU CS 2023 HW4 Write Up

01-31

Simple Web 0x12(Lab - Web Preview Card)

01-01

Simple Web 0x18(Lab - Magic Cat)

01-01

Simple Web - 0x09(Lab - Simple Note)

05-13

Simple Web - 0x08(Lab - `Particles.js`)

02-13

Simple Web - 0x04(Lab - Normal Login Panel (Flag 2))

02-13

Simple Web - 0x03(Lab - Normal Login Panel (Flag 1))

02-13

Simple Web - 0x02(Lab - Whois Tool)

02-13

Simple Web 0x23(Lab - XXE)

02-09

Simple Web 0x17(Lab - Baby Cat)

02-06

Simple Web 0x16(Lab - Pickle)

02-05

Simple Web 0x01(Lab - Hello from Windows 98)

01-31

Simple Web 0x10(Lab - DNS Lookup Tool | WAF)

12-08

Simple Web 0x09(Lab - DNS Lookup Tool)

01-31

Simple Web 0x02(Lab - `.DS_Store`)

01-31

Simple Web 0x01(Lab - `gitleak`)

01-31

Simple Web 0x08(Lab - My First Meow Website)

01-31

Simple Web 0x07(Lab - `HakkaMD`)

01-31

Simple Web 0x06(Lab - Image Space 0x03)

01-31

Simple Web 0x05(Lab - Image Space 0x02)

01-31

Simple Web 0x04(Lab - Image Space 0x01)

01-31

Simple Web 0x19(Lab - PHP Login)

02-03

Simple Web 0x18(Lab - Magic Cat)

01-01

Simple Web 0x23(Lab - XXE)

02-09

Simple Web 0x17(Lab - Baby Cat)

02-06

Simple Web 0x16.5(php unserialize)

02-05

Simple Web 0x16(Lab - Pickle)

02-05

Simple Web 0x15.5(Pickle)

02-05

Simple Web 0x11(Lab - XSS Me)

02-09

Simple Web 0x12(Lab - Web Preview Card)

01-01

Simple Web 0x14(Lab - Debug)

02-09

Simple Web 0x13(Lab - SSRFrog)

02-09

AIS3 Pre-Exam 2025

05-24

TSCCTF 2024

02-19

AIS3 EOF 2024

02-19

BalsnCTF 2023

02-07

AIS3 EOF 2023 初賽

02-07

神盾盃2023初賽

01-31

PicoCTF 2023

01-31

DEADFACE CTF 2023

01-31

CGGC 2023 初賽

01-31

CSC 2023 決賽

11-28

AIS3 Pre-Exam 2023

05-13

EOF AIS3 Final

02-14

Simple Crypto - 0x02(Random Number Generator - LCG)

02-19

Simple Crypto 0x13(2023 HW - Power Analysis)

01-31

Simple Crypto 0x12(2023 HW - signature_revenge)

01-31

Simple Crypto 0x11(2023 HW - invalid_curve_attack)

01-31

Simple Crypto - 0x10(2023 Lab - coppersmith)

01-31

Simple Crypto - 0x09(2023 Lab - signature)

01-31

Simple Crypto - 0x08(2023 Lab - dlog)

01-31

Simple Crypto - 0x07(2023 HW - Oracle)

01-31

Simple Crypto - 0x06(2023 HW - LFSR)

01-31

Simple Crypto - 0x05(2023 Lab - LSB)

01-31

Simple Crypto - 0x04(2023 Lab - POA)

01-31

Simple Crypto - 0x03(2023 Lab - COR)

01-31

NTU CS 2023 HW1 Write Up

01-31

Simple Crypto - 0x03(Lab - LFSR)

10-12

Simple Crypto - 0x01(Modular Operation)

02-14

Simple Welcome 0x02 & 0x05(Lab - Nine & Nine-Revenge)

03-04

Simple Welcome 0x01(Lab - Let's meet at class)

01-31

NTU CS HW0 Write Up

01-31

Simple Welcome - 0x04(Lab - Script)

02-15

PicoCTF - Most Cookies

02-07

PicoCTF - notepad

01-31

PicoCTF - Some Assembly Required 3

01-31

PicoCTF - More SQLi

01-31

PicoCTF - Java Script Kiddie

01-31

PicoCTF - Java Code Analysis!?!

01-31

PicoCTF - JaWT Scratchpad

01-31

PicoCTF - JAUTH

01-31

PicoCTF - Secrets

06-26

PicoCTF - caas

06-20

PicoCTF - Super Serial

06-20

PicoCTF - Some Assembly Required 2

06-20

PicoCTF - Who are you?

06-19

PicoCTF - Some Assembly Required 1

06-18

PicoCTF - It is my Birthday

06-18

PicoCTF - dont-use-client-side

02-26

PicoCTF - Cookies

02-20

PicoCTF - Scavenger Hunt

02-18

PicoCTF - Insp3ct0r

02-18

PicoCTF - SQLiLite

02-15

Adworld - miao~

01-31

Adworld - Misc文件類型

01-31

Adworld - 3-1

01-31

Adworld - 適合作為桌面

02-17

Adworld - 心儀的公司

02-17

Adworld - pure_color

02-17

PicoCTF - information

02-17

PicoCTF - shark on wire 2

01-31

PicoCTF - scrambled-bytes

01-31

PicoCTF - WebNet0

01-31

PicoCTF - Torrent Analyze

01-31

PicoCTF - Eavesdrop

01-31

PicoCTF - WPA-ing Out

02-22

PicoCTF - shark on wire 1

02-21

PicoCTF - Wireshark twoo twooo two twoo...

02-21

PicoCTF - Trivial Flag Transfer Protocol

02-18

PicoCTF - `Wireshark doo dooo do doo...`

02-17

PicoCTF - SideChannel

01-31

PicoCTF - Investigative Reversing 0

02-25

PicoCTF - like1000

02-23

PicoCTF - WhitePages

02-22

PicoCTF - File types

02-20

PicoCTF - MacroHard WeakEdge

02-18

PicoCTF - Matryoshka doll

02-17

PicoCTF - m00nwalk2

02-24

PicoCTF - c0rrupt

02-23

PicoCTF - m00nwalk

02-22

PicoCTF - advanced-potion-making

02-18

PicoCTF - `tunn3l v1s10n`

02-17

Simple Web 0x15(Lab - `Jinja`)

12-08

Simple Web 0x22(Lab - Pug)

02-18

PicoCTF - Operation Orchid

01-31

PicoCTF - Operation Oni

01-31

PicoCTF - Pitter, Patter, Platters

02-21

PicoCTF - Disk, disk, sleuth! II

02-21

PicoCTF - Sleuthkit Intro

02-20

How to address filtering unicode in search.xml

04-19

How to set up DNS to request risked website

04-12

/wp-admin VS /wp-content VS /wp-include VS /wp-json

01-19

How to address docker compose not found

11-25

React Native - Error resolving plugin [id: com.facebook.react.settings]

11-06

Git Large File Error - Solution

11-01

Endnote - Invalid Citation

10-16

How to adjust Endnote's Paragraph in Word

10-10

MITMProxy相關問題整理

09-05

Problems About Multiprocess

08-16

WSL2 Cannot List Android Devices

08-14

UiAutomatorViewer 常見問題整理

08-14

寫論文參考的工具或影片

03-20

zshrc & Initial Library

01-31

WSL tty /dev/tty0

01-31

VirtualBox滑鼠無法跳出

01-31

Unexpected fatal error while initializing python runtime

01-31

CreateProcessEntryCommon:586: Create process not expected to return

06-09

fatal: Authentication failed for https://github.com/{username}/{repository}.git/

05-12

sudo chmod 777 -R /usr Problem

02-22

PicoCTF - Surfing the Waves

02-24

NISRA - MD5_2

01-31

NISRA - MD5_1

03-07

NISRA - different places

03-06

PicoCTF - john_pollard

06-19

PicoCTF - NSA Backdoor

06-19

PicoCTF - corrupt-key-1

06-18

PicoCTF - Very Smooth

06-18

PicoCTF - Scrambled: RSA

06-18

PicoCTF - SRA

06-18

PicoCTF - Dachshund Attacks

06-18

PicoCTF - It's Not My Fault 1

06-17

PicoCTF - No Padding, No Problem

06-10

PicoCTF - Mini RSA

06-10

PicoCTF - Mind your Ps and Qs

03-06

A&D of Network Security - Lab 4(ARP & DNS SPOOFING)

05-10

A&D of Network Security - Lab 14

05-30

A&D of Network Security - Lab 13

05-27

A&D of Network Security - Lab 3

05-25

A&D of Network Security - Lab 12

05-21

A&D of Network Security - Lab 7

04-11

A&D of Network Security Note

03-19

A&D of Network Security - Lab 2

03-12

PicoCTF - XtraORdinary

01-31

PicoCTF - Sequences

01-31

PicoCTF - New Caesar

03-18

PicoCTF - Easy Peasy

03-14

Cryptography Lec 6(Key Agreement Protocol) - Notes

04-21

Cryptography Lec 5(Symmetric Key Cryptography) - Notes

04-20

Cryptography Lec 4(Information Theory) - Notes

04-20

Cryptography Lec 3(Mathematical Background) - Notes

04-08

Cryptography Lec 1(Overview) - Notes

03-20

Cryptography Lec 2(Historical Ciphers) - Notes

03-18

PicoCTF - mus1c

06-19

PicoCTF - flag_shop

06-19

PicoCTF - Special & Specialer

06-19

PicoCTF - PW Crack 4

03-18

Lecture 10

05-27

Data Structure

05-27

Lecture 8

05-18

Lecture 6

05-05

Lecture 4

04-28

Lecture 2

04-21

CSRF - APPRENTICE

04-25

Lab: CSRF where token validation depends on token being present

04-25

Lab: CSRF where token validation depends on request method

04-25

Lab: CSRF where token is not tied to user session

04-25

SQLi - APPRENTICE

04-25

Lab: SQL injection attack, querying the database type and version on Oracle

04-25

Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft

04-25

Lab: SQL injection attack, listing the database contents on non-Oracle databases :four:

04-25

Lab: SQL injection attack, listing the database contents on Oracle

04-25

Lab: SQL injection UNION attack, retrieving multiple values in a single column

04-25

Lab: SQL injection UNION attack, retrieving data from other tables

04-25

Lab: SQL injection UNION attack, finding a column containing text

04-25

Lab: SQL injection UNION attack, determining the number of columns returned by the query

04-25

XSS - APPRENTICE

04-25

Lab: Stored DOM XSS

04-25

Lab: DOM XSS in `document.write` sink using source `location.search` inside a select element

04-25

XXE - APPRENTICE

04-27

Lab: Exploiting `XInclude` to retrieve files

04-27

Lab: Exploiting XXE via image file upload

04-27

Lab: CSRF where token is tied to non-session cookie

04-28

Lab: Using application functionality to exploit insecure deserialization

05-08

Lab: Exploiting Java deserialization with Apache Commons

05-08

Lab: Modifying serialized data types

04-28

Lab: Arbitrary object injection in PHP

04-28

Deserialization - APPRENTICE

04-28

Cryptography and Network Security - Final Project

06-18

NTU CNS Final Project Proposal

04-30

Lab: Blind XXE with out-of-band interaction

05-08

Lab: Blind XXE with out-of-band interaction via XML parameter entities

05-08

Lab: Exploiting blind XXE to retrieve data via error messages

05-08

Lab: Exploiting blind XXE to exfiltrate data using a malicious external DTD

05-08

PicoCTF - Compress and Attack

06-18

PicoCTF - AES-ABC

06-19

PicoCTF - Double DES

06-18

PicoCTF - not crypto

01-31

PicoCTF - gogo

01-31

PicoCTF - droids4

01-31

PicoCTF - droids3

01-31

PicoCTF - droids1

01-31

PicoCTF - asm4

01-31

PicoCTF - Wizardlike

01-31

PicoCTF - Powershelly

01-31

PicoCTF - Picker III

01-31

PicoCTF - OTP Implementation

01-31

PicoCTF - No way out

01-31

PicoCTF - Let's get dynamic

01-31

PicoCTF - Forky

01-31

PicoCTF - Easy as GDB

01-31

PicoCTF - ARMssembly 0

01-31

PicoCTF - Transformation

06-18

CrewCTF - :-1: Questions

07-11

CrewCTF - ez rev

07-16

CrewCTF - OhPHP

07-12

変な家2 ~11の間取り図~(詭屋 2:11張平面圖)

09-16

The Puppet Show(歡迎觀賞殺人預告)

09-12

Choose Me(選擇)

08-06

日本恐怖實話:台日靈異交匯、鬼魅共襄盛舉;令人毛骨悚然的撞鬼怪談!

06-17

ソロモンの偽証(所羅門的偽證-事件)

06-02

ゴメンナサイ(對不起)

05-15

Hidden Pictures(詭畫連篇)

12-13

怪談和尚の京都怪奇譚(京都怪奇談: 看遍怨靈、輪迴與冥界的愛恨嗔癡,日本高僧三木大雲親身遇見的「另一個世界」)

12-12

砂の器(砂之器)

08-19

謎解きはディナーのあとで(推理要在晚餐後)

08-12

有問題的網站

03-07

Docker Cheat Sheet

01-19

Real World Tools

11-27

Useful Link

08-10

Command Cheat Sheet

05-22

$\LaTeX$ 語法筆記

11-23

Simple Web 0x03(Lab - Log me in + Revenge)

12-08

動漫出版社

04-14

投資理財

03-24

日本知名的漫畫相關獎項

01-30

English Writing Vocabulary

06-14

AI Prompt

01-31

Merge Two Sorted Lists

05-13

LeetCode - Valid Parentheses

01-31

LeetCode - Two Sum

01-31

Simple Reverse - 0x01(Lab - Sacred Arts)

02-07

Simple Reverse - 0x30(2023 HW - Evil FlagChecker)

01-31

Simple Reverse - 0x29(2023 Lab - Unpackme)

01-31

Simple Reverse - 0x28(2023 Lab - Super Angry)

01-31

Simple Reverse - 0x27(2023 Lab - Scramble)

01-31

Simple Reverse - 0x26(2023 HW - Banana Donut Verifier)

01-31

Simple Reverse - 0x15(2023 HW - crackme_vectorization)

01-31

Simple Reverse - 0x14(2023 Lab - AssemblyDev)

01-31

Simple Reverse 0x13(Lab - Meow)

01-31

Simple Reverse 0x12(Lab - TLSCallback)

01-31

Simple Reverse 0x11(Lab - Exception)

01-31

Simple Reverse 0x08(Lab - GetProcAddress)

01-31

Simple Reverse 0x06(Lab - AMessageBox)

01-31

Simple Reverse - 0x03(Lab - Why)

01-31

NTU CS 2023 HW2 Write Up

01-31

Simple Reverse 0x31(2023 HW - Baby Ransom 2)

01-31

Simple Reverse 0x30(2023 HW - Baby Ransom 1)

01-31

Simple Reverse - 0x25(2023 Lab - WinMalware - 作業)

01-31

Simple Reverse - 0x24(2023 Lab - WinMalware - Dynamic API Resolution Background)

01-31

Simple Reverse - 0x23(2023 Lab - WinMalware - Exfiltrate)

01-31

Simple Reverse - 0x22(2023 Lab - WinMalware - Collect)

01-31

Simple Reverse - 0x21(2023 Lab - WinMalware - Extract Next Stage Payload - 3)

01-31

Simple Reverse - 0x20(2023 Lab - WinMalware - Extract Next Stage Payload - 2)

01-31

Simple Reverse - 0x19(2023 Lab - WinMalware - Extract Next Stage Payload)

01-31

Simple Reverse - 0x18(2023 Lab - WinMalware - sub_140001120)

01-31

Simple Reverse - 0x17(2023 Lab - WinMalware - sub_140001030)

01-31

Simple Reverse - 0x16(2023 Lab - WinMalware - sub_140001C80)

01-31

NTUSTISC - AD Note - Lab(環境調查BloodHound)

01-31

NTUSTISC - AD Note - Lab(當前網域控制站(DC))

01-31

NTUSTISC - AD Note - Lab(查詢網域群組)

01-31

NTUSTISC - AD Note - Lab(偵測查詢的操作)

01-31

NTUSTISC - AD Note - Lab(Leak Password)

01-31

NTUSTISC - AD Note(Lab - 查詢網域使用者)

01-31

NTUSTISC - AD Note - Lab(查詢本地使用者)

01-31

NTUSTISC - AD Note - Lab(錯誤配置)

01-31

NTUSTISC - AD Note - Lab(偵測提權)

01-31

NTUSTISC - AD Note - Lab(Hijack Token)

01-31

NTUSTISC - AD Note - Lab(利用弱點)

01-31

NTUSTISC - AD Note - 會後提及有用的工具

01-31

NTUSTISC - AD Note - 環境建置 & Background

01-31

NTUSTISC - AD Note - Lab(AS-REP Roasting)

01-31

NTUSTISC - AD Note - Lab(無法Reboot的時盜取Passwd)

01-31

NTUSTISC - AD Note - Lab(顯示Mimikatz的明文)

01-31

NTUSTISC - AD Note - Lab(其他方法得到lsass.dmp)

01-31

NTUSTISC - AD Note - Lab(偵測LSASS)

01-31

NTUSTISC - AD Note - Lab(透過Mimikatz取得Local Admin的NTLM)

01-31

NTUSTISC - AD Note - Lab(偵測密碼揮灑)

01-31

NTUSTISC - AD Note - Lab(Password Spraying)

01-31

NTUSTISC - AD Note - Lab(Brute Force SAM)

01-31

NTUSTISC - AD Note - Lab(SMB遠端讀寫)

01-31

NTUSTISC - AD Note - Lab(遠端執行(RDP)2)

01-31

NTUSTISC - AD Note - Lab(遠端執行(RDP))

01-31

Simple Web 0x24(Lab - how2http)

01-31

TaiwanHolyHigh - SoC基礎維運 - HW2

01-31

TaiwanHolyHigh - SoC基礎維運 - ArcSight教學

01-31

TaiwanHolyHigh - Windows Forensics - Windows檔案系統與還原

01-31

TaiwanHolyHigh - Windows Forensics - Windows Artifacts

01-31

TaiwanHolyHigh - Windows Forensics - LNK Lab

01-31

TaiwanHolyHigh - Windows Forensics - Background

01-31

TaiwanHolyHigh - Windows Forensics - $MFT 基本實作

01-31

TaiwanHolyHigh - Windows Forensics - $MFT Resident / Non-Resident File

01-31

TaiwanHolyHigh - Windows Forensics - $MFT Background

01-31

BTLO - Shiba Insider

01-31

BTLO - Meta

01-31

BTLO - Secrets

01-31

BTLO - Paranoid

01-31

BTLO - Log Analysis -Compromised WordPress

01-31

BTLO - Follina

01-31

BTLO - Bruteforce

01-31

BTLO - Phishing Analysis

01-31

CrewCTF - Encrypt10n(Part 2)

01-31

CrewCTF - Encrypt10n(Part 1)

01-31

CrewCTF - Attaaaaack 1-13

01-31

CrewCTF - sequence_gallery

01-31

CyberDefender - KrakenKeylogger

01-31

CyberDefender - Spotlight

01-31

CyberDefender - RedLine

01-31

CyberDefender - BlackEnergy

01-31

CyberDefender - CorporateSecrets (Part 4)

01-31

CyberDefender - CorporateSecrets (Part 3)

01-31

CyberDefender - CorporateSecrets (Part 2)

01-31

CyberDefender - CorporateSecrets (Part 1)

01-31

CyberDefender - Hunter (Part 3)

01-31

CyberDefender - Hunter (Part 2)

01-31

CyberDefender - Hunter (Part 1)

01-31

CyberDefender - MrRobot - Target 2

01-31

NTUSTISC - CyberDefender - MrRobot - Target 1

01-31

CyberDefender - MrRobot - POS

01-31

CyberDefender - Szechuan Sauce (Part 2)

01-31

CyberDefender - Szechuan Sauce (Part 1)

01-31

CyberDefender - WebStrike

01-31

CyberDefender - Tomcat Takeover

01-31

CyberDefender - PsExec Hunt

01-31

CyberDefender - PoisonedCredentials

01-31

CyberDefender - L'espion

01-31

CyberDefender - Intel101

01-31

CyberDefender - GrabThePhisher

01-31

HackTheBox

01-31

NISRA 2023 Enlightened - Pixel

01-31

NISRA 2023 Enlightened - Magic Function

01-31

NISRA 2023 Enlightened - Jack的flag

01-31

Background

01-31

NISRA - Hidden?

01-31

PicoCTF - Easy Peasy Or Bad Questions

01-31

PicoCTF - PowerAnalysis Part 1 / Part 2

01-31

PicoCTF - x-sixty-what

01-31

PicoCTF - two-sum

01-31

PicoCTF - tic-tac

01-31

PicoCTF - stack cache

01-31

PicoCTF - seed-sPRiNG

01-31

PicoCTF - ropfu

01-31

PicoCTF - hijacking

01-31

PicoCTF - function overwrite

01-31

PicoCTF - flag leak

01-31

PicoCTF - filtered-shellcode

01-31

PicoCTF - fermat-strings

01-31

PicoCTF - buffer overflow 2

01-31

PicoCTF - babygame02

01-31

PicoCTF - babygame01

01-31

PicoCTF - VNE

01-31

PicoCTF - Unsubscriptions Are Free

01-31

PicoCTF - Stonk Market

01-31

PicoCTF - SaaS

01-31

PicoCTF - RPS

01-31

PicoCTF - Kit Engine

01-31

PicoCTF - Guessing Game 2

01-31

PicoCTF - Guessing Game 1

01-31

All Pentest Tools

06-17

Crypto Cheat Sheet

03-19

Web Cheat Sheet

02-07

利用Metasploit Framework測試一些網站

01-31

Reverse Overview

01-31

PWN Overview

01-31

Misc Cheat Sheet

01-31

Forensics Cheat Sheet

01-31

Add Custom Sidebar to Left Side

04-17

Add Third-Party Service to Jekyll

04-15

如何使用Jekyll架設Blog

04-11

如何使用Hugo+Github架設網站

04-02

How to download blob videos

12-17

How to build apk file on React-Native Project

11-27

How to use Mailgun/Resend as SMTP server

11-26

How to install aab file

11-12

How to Root Android Phone and Install AlwaysTrustUserCert.zip Module

10-26

How to check if the paper is Top Conference or Q1 Journal

10-08

How to use ZAP/Burp Suite/mitmproxy as Proxy for Android

07-22

pwndbg installation problems

01-31

How to use VScode / Web Storm Debug JS

01-31

How to install LogonTracer

01-31

Cryptography and Network Security – Homework 3

02-07

Cryptography and Network Security – Homework 2

02-07

Cryptography and Network Security – Homework 1

02-07

Cryptography and Network Security – HW0

02-07

Cryptography and Network Security – Regular Critique 4

02-07

Cryptography and Network Security – Regular Critique 3

02-07

Cryptography and Network Security – Comparative Critique 3

02-07

Cryptography and Network Security – Comparative Critique 2

02-07

Cryptography and Network Security – Comparative Critique 1

02-07

Cryptography and Network Security - Regular Critique 2

02-07

Trapa Interview

03-27

TeamT5筆試題目筆記

03-20

Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis

06-20

VAPTAi: A Threat Model for Vulnerability Assessment and Pentesting of Android and iOS Mobile Banking Apps

06-02

A MITM Based Penetration Test Efficiency Improvement Approach for Traffic-Encrypted Mobile Apps of Power Industry

05-16

Cross-site Scripting Attacks on Android Hybrid Applications

05-15

WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens

05-14

Understanding Real-world Threats to Deep Learning Models in Android Apps

05-14

Uncovering Intent based Leak of Sensitive Data in Android Framework

05-14

Exploiting ML ALG for Efficient Detection and Prevention of JS-XSS Attacks in Android Based Hybrid Applications

05-14

A Mitmproxy-based Dynamic Vulnerability Detection System For Android Applications

05-14

How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update - Notes

05-14

The State of Ethereum Smart Contracts Security: Vulnerabilities, Countermeasures, and Tool Support - Notes

05-14

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning - Notes

05-14

FedML-HE - An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System - Notes

05-14

EIFFeL: Ensuring Integrity For Federated Learning - Notes

05-14

DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning

05-14

DEEPCASE Semi-Supervised Contextual Analysis of Security Events - Notes

05-14

Programming Related

03-21

Math Related

03-13

Reinforcement Learning

03-07

Android Related

11-27

Node Related

11-12

Network Related

06-14

Linux Related

06-13

What is IDS, IPS, EDR, MDR, NSM, SIEM?

05-14

What is DevOps, MLOps, CI/CD?

05-14

有關Pentest但貢獻很爛的三篇論文

06-14

Pentest Tools Survey

06-03

Drozer Cheat Sheet

06-04

Test DIVA - content provider exported - DB Based

06-04

Test DIVA - activity exported

06-04

Test Sieve - services exported

06-04

Test Sieve - is debuggable

06-04

Test Sieve - content providers exported - File SystemBased

06-04

Test Sieve - content providers exported - DB Based

06-04

Test Sieve - broadcast receivers exported

06-04

Test Sieve - activities exported

06-04

Drozer/MobSF Installation

06-04

Test Sieve by MobSF

06-04

WFuzz

01-08

Directory Fuzzing/Traversal Tools

08-10

Droidbot

12-28

Maxim

09-03

AppCrawler

09-03

App Crawler 無法使用紀錄

09-03

Fastbot Android

08-30

App Crawler Overview

08-14

Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement Learning

03-21

Fastbot: A Multi-Agent Model-Based Test Generation System

03-04

2025日本自由行

07-30

cocoon コクーン(cocoon 繭:沖繩姬百合隊的血色青春)

09-28

Điện Biên Phủ(奠邊府戰歌)

09-20
SBK6401

SBK6401

595 posts
111 categories
73 tags
RSS
GitHub
© 2022 - 2025 SBK6401
Powered by Jekyll
Theme - NexT.Mist