Explore how reverse mortgages and property titles impact retirement planning, home equity, and long-term financial options for homeowners.| Supreme Lending Blog
Learn how homeownership works with a reverse mortgage, who holds the title, and what it means for you and your financial future.| Supreme Lending Blog
For homeowners 62+, learn how to apply for a reverse mortgage loan and turn home equity into funds—while staying in your home.| Supreme Lending Blog
In today’s competitive trade environment, margins are tight, projects are fast-paced, and clients are more environmentally conscious than ever. Whether you’re a construction firm, a plumbing contractor, or an electrician, you know the importance of running a lean, efficient operation. But what if there’s a hidden area where you could improve efficiency, reduce costs, and […]| Construction Marketing Agency | Digital Marketing For Construction Industry
Hacking include sharing. This place dump stuffs I found interesting, maybe it can be helpful for others.| vegvisir
Unlike years past, HUD’s congressional budget justifications for 2026 included few reverse mortgage details.| HousingWire
A few years ago, I joked about FLOSS activists refusing to use closed-source firmware devices needing to build…| Flameeyes's Weblog
Last weekend I was looking for a reverse Windows challenge. The Midnight Flag CTF provides one challenge of this kind (difficulty : easy). Here is a short write-up & lessons learned about it. About Midnight Flag CTF In the field of computer security, the CTF (Capture the Flag) is a type of competitive event or challenge designed to test participants’ skills in various aspect, to find and/or exploit vulnerabilities affecting software, websites or computer systems in order to get a flag (drap...| vegvisir
Hacking include sharing. This place dump stuffs I found interesting, maybe it can be helpful for others.| vegvisir
Discover the challenges of ClickFix12 and the newly identified I2PRAT. Uncover the advanced techniques employed by this multi-stage RAT.| Sekoia.io Blog
Let's try to understand what the TypeScript guys mean when they talk about reverse mapped types.| andrea simone costa
Last week I gave myself the challenge to create something in a week. Not a mockup, but a complete usable solution with documentation and enough tests to make it feel solid. I have been looking at DigitalOcean for some time, and while browsing their documentation I came across a sample script that would help you set...| defer time.Sleep()
The dig utility is convenient for doing manual DNS resolution from your system. Additionally, it uses the same OS resolver libraries as your applications which makes it more accurate than nslookup for emulating application issues and its output is more suitable for machine parsing. # ensure 'dig' is installed sudo apt install -y bind9-dnsutils dig ... Bash: using dig for reverse DNS lookup by IP| Fabian Lee : Software Engineer
Whenever I reverse a sample, I am mostly interested in how it was developed, even if in the end the techniques employed are generally the same, I am always curious about what was the way to achieve a task, or just simply understand the code philosophy of a piece of code. It is a very... » read more| Fumik0_'s box
Loaders nowadays are part of the malware landscape and it is common to see on sandbox logs results with “loader” tagged on. Specialized loader malware like Smoke or Hancitor/Chanitor are facing more and more with new alternatives like Godzilla loader, stealers, miners and plenty other kinds of malware with this developed feature as an option.... » read more| Fumik0_'s box
When you are a big fan of the Konosuba franchise, you are a bit curious when you spot a malware called “Megumin Trojan” (Written in C++) on some selling forums and into some results of sandbox submissions. Before some speculation about when this malware has appeared, this one is not recent and there are some... » read more| Fumik0_'s box
After some issues that kept me far away from my researches, it’s time to put my hands again on some sympathetic stuff. This one is technically and finally my real first post of the year (The anti-VM one was a particular case). So today, we will dig into Qulab Stealer + Clipper, another password-stealer that... » read more| Fumik0_'s box
Well, it’s been a long time without some fresh new contents on my blog. I had some unexpected problems that kept me away from here and a lot of work (like my tracker) that explain this. But i…| Fumik0_'s box
In this part of the series we'll focus on exploiting a simple binary. radare2 has many features which will help us in exploitation, such as...| Megabeets
Writeup of FBCTF 2019 rank challenge.| LingSec
Writeup of FBCTF 2019 Overfloat challenge.| LingSec
Tutorial on how to reverse engineer Unity games to gain understanding of their inner workings.| LingSec
CrackIT| Blog
In the previous post, we explained how to dump Exynos bootROM. Exynos (8895 in this post) bootROM contains a minimal USB stack to load a signed bootloader from an USB host (a.k.a. boot from USB). This post summarizes how this USB stack can be reversed using the Great …| fred's notes
Some notes for Windows drivers reversing with IDA and GHIDRA| vegvisir