Unicorn Security

Breaching Unicorns

Hire us! Blog About

What not to do with on prem virtualization

Common misconfigurations in on prem VM environments


Read More

Les erreurs à ne pas commettre avec les machines virtuelles

Erreurs courantes liées à la virtualisation, et exemples d’exploitation


Read More

Tales of the Crimson Foes - Part 1

The Tales of the Crimson Foes
A compilation of red team and pentest stories


Read More

Tricard - Malware sandboxes fingerprinting

Introduction to malware sandboxes fingerprinting


Read More

OSCP tips and tricks

How to pwn OSCP labs and exams ! (100 + 10 / 100 points)


Read More

Hacking a Harley's Tuner - Part 3

Completion of the primary objective


Read More

Hacking a Harley's Tuner - Part 2

Reverse Engineering a famous Harley’s tuner


Read More

Hacking a Harley's Tuner

Finding my ways to the firmware of a famous Harley tuner


Read More

AliExpress Captcha Reuse

Captcha reuse in Aliexpress login form


Read More

Reversing TL-WR840N

Buying cheap routers to find vulnerabilities in them


Read More

FCSC - Keykoolol - Write up

This is a write up for one of the FCSC (French Cyber Security Challenge) reverse engineering challenges.


Read More