sudo systemctl hibernate

After 5 magnificent years filled with posts, comes that moment that animals living in extremely cold conditions know, hibernation. Many heartfelt thanks to the contributors of the blog, this adventure would have been very different without the help of each

Interview with Vicente Motos (@hackplayers)

Vicente started working in security within Thales, and is currently team leader in SIA group. I’m sure many of you have read his blog more than once, Hackplayers. It has been recognized as one of the community’s reference blogs and

Blockchain. ¿revolutionary technology or hype?

I am convinced that if  you follow the technological world, you will have heard during the last year or maybe before, about that wonderful technology known as blockchain destined according to many to revolutionize the world of cybersecurity and not

Loading binaries in Linux

Executables are a static representation of a program and that at the time they are executed, the kernel uses the information included in those files to create a dynamic representation, better known as the process images. Before being able to execute

Automatic Heap Layout Manipulation via #UseSec18

Automatic exploit generation is a concept that has been studied during the last years, focusing mainly on buffer overflows located in the stack. The main objective of these works is generally to develop algorithms that produce control-flow hijacking exploits based

How hacking could change history

Although hacking began as simple entertainment for a group of enthusiastic young people, much has changed since then. Today, all countries have, to a greater or lesser extent, a response or attack group of this type. The clearest examples would


Our sandbox for packers