The reason for MMA was to find a way to let the different martial arts practitioners fight against each other
Continue readingAuthor: max-sperling
Ground fight position hierarchy
Overview Position Action Submissions (No Gi) Back Mount (Back) Finish Rear naked [ch], Armbar [jl], Neck crank [jl] Mount (Top)
Continue readingFake Access Point
A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil
Continue readingCyclic dependencies (C++)
Issue The cyclic dependency is a problem which occurs if two classes includes each other in their header. hen.hpp egg.hpp
Continue readingSQL Injection
If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,
Continue readingARP Spoofing
This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just
Continue readingSession Hijacking (via Sniffing or XSS)
If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.
Continue readingUsage of variables in regex
If you want to replace lots of text and all of them are based on the same pattern, it would
Continue readingAntriebsstrang
Motor –> Kupplung –> Getriebe (–> Kardanwelle) (–> Zentraldifferential) –> Achsdifferential –> Antriebswelle –> Räder Motor (4-Takt-Ottomotor): Beim betätigen des
Continue readingOperating System APIs (C++)
Before using the OS APIs directly, take a look if the STL or boost already provides this functionality. Also be
Continue reading