<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://therustymate.com/</id><title>The Rusty</title><subtitle>The Rusty (@therustymate)</subtitle> <updated>2026-05-21T03:21:59+00:00</updated> <author> <name>therustymate</name> <uri>https://therustymate.com/</uri> </author><link rel="self" type="application/atom+xml" href="https://therustymate.com/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://therustymate.com/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 therustymate </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>BridgeTrojGen - How legitimate software can be used for malware</title><link href="https://therustymate.com/posts/BridgeTrojGen_Development/" rel="alternate" type="text/html" title="BridgeTrojGen - How legitimate software can be used for malware" /><published>2026-01-18T15:00:00+00:00</published> <updated>2026-01-18T15:00:00+00:00</updated> <id>https://therustymate.com/posts/BridgeTrojGen_Development/</id> <content type="text/html" src="https://therustymate.com/posts/BridgeTrojGen_Development/" /> <author> <name>therustymate</name> </author> <category term="Malware Research" /> <category term="Malware Development" /> <summary>Red Team PoC - Proxy DLL Payload Generator</summary> </entry> <entry><title>PicoCTF - Input Injection 1</title><link href="https://therustymate.com/posts/Input_Injection_1/" rel="alternate" type="text/html" title="PicoCTF - Input Injection 1" /><published>2025-11-20T15:00:00+00:00</published> <updated>2025-11-20T15:00:00+00:00</updated> <id>https://therustymate.com/posts/Input_Injection_1/</id> <content type="text/html" src="https://therustymate.com/posts/Input_Injection_1/" /> <author> <name>therustymate</name> </author> <category term="CTF Writeup" /> <category term="PicoCTF" /> <summary>PicoCTF Writeup for Input Injection 1 Challenge</summary> </entry> <entry><title>CVE-2021-43579 1-Day Exploit Analysis</title><link href="https://therustymate.com/posts/CVE-2021-43579_1-Day_Exploit_Analysis/" rel="alternate" type="text/html" title="CVE-2021-43579 1-Day Exploit Analysis" /><published>2025-11-19T15:00:00+00:00</published> <updated>2025-11-19T15:00:00+00:00</updated> <id>https://therustymate.com/posts/CVE-2021-43579_1-Day_Exploit_Analysis/</id> <content type="text/html" src="https://therustymate.com/posts/CVE-2021-43579_1-Day_Exploit_Analysis/" /> <author> <name>therustymate</name> </author> <category term="Exploit Research" /> <category term="Exploit Analysis" /> <summary>1-Day Exploit Analysis for CVE-2021-43579 (HTMLDOC <= 1.9.13)</summary> </entry> <entry><title>PicoCTF - ropfu</title><link href="https://therustymate.com/posts/ropfu/" rel="alternate" type="text/html" title="PicoCTF - ropfu" /><published>2025-10-28T15:00:00+00:00</published> <updated>2025-10-28T15:00:00+00:00</updated> <id>https://therustymate.com/posts/ropfu/</id> <content type="text/html" src="https://therustymate.com/posts/ropfu/" /> <author> <name>therustymate</name> </author> <category term="CTF Writeup" /> <category term="PicoCTF" /> <summary>PicoCTF Writeup for ropfu Challenge</summary> </entry> <entry><title>PicoCTF - buffer overflow 1</title><link href="https://therustymate.com/posts/buffer_overflow_1/" rel="alternate" type="text/html" title="PicoCTF - buffer overflow 1" /><published>2025-10-25T15:00:00+00:00</published> <updated>2025-10-25T15:00:00+00:00</updated> <id>https://therustymate.com/posts/buffer_overflow_1/</id> <content type="text/html" src="https://therustymate.com/posts/buffer_overflow_1/" /> <author> <name>therustymate</name> </author> <category term="CTF Writeup" /> <category term="PicoCTF" /> <summary>PicoCTF Writeup for buffer overflow 1 Challenge</summary> </entry> </feed>
