Professionally Evil Blog
A blog by experts of penetration testing and other security assessments.

A Hacker’s Tour of the X86 CPU Architecture
Overview The Intel x86 CPU architecture is one of the most prolific CPU architectures for desktops, ...
Learn more

LD_PRELOAD: How to Run Code at Load Time
Today I want to continue the series on using LD_PRELOAD. In previous posts, we covered how to ...
Learn more

Converting NMAP XML Files to HTML with xsltproc
NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, ...
Learn more

Solving the November 13th Detective Nevil Mystery Challenge
Overview Each week on Friday, we post a social media challenge known as “Detective Nevil Mystery ...
Learn more

Not-So-Random: Using LD_PRELOAD to Hijack the rand() Function
Today I wanted to continue the series on using LD_PRELOAD. In today’s post we are going to use ...
Learn more

LD_PRELOAD - Introduction
Today I wanted to start what I plan to be a small series of blog posts about LD_PRELOAD. LD_PRELOAD ...
Learn more