Interactive Guide to Buffer Overflow exploitation on Wed, Feb 19, 2025 In Exploit Development, Reverse Engineering Tags exploit, buffer overflow, malware
DACL Permissions Overwrite Vulnerability in Check Point VPN on Sun, Jun 23, 2019 In Bug Hunting Tags pentesting, hacking, windows, check point, exploit, cve, privesc
Privilege Escalation vulnerability in CrashPlan on Fri, Jun 21, 2019 In Bug Hunting Tags pentesting, hacking, windows, crashplan, exploit, cve, privesc
Debugging Windows services on Fri, Jan 25, 2019 In Exploit Development Tags pentesting, hacking, windows, debugging, exploit, windbg
Interactive Beginner's Guide to ROP on Mon, Dec 17, 2018 In Exploit Development, Reverse Engineering Tags exploit, return oriented programming, rop, malware
Securing the Lua interpreter in PHP on Wed, Apr 4, 2018 In PHP, Secure App Development Tags lua, php, php7
Temporarily mitigating SQL injection by custom Python proxy on Wed, Mar 28, 2018 In SQL Injection, Mitigation Tags sql injection, sqli, python, whitelist
Escalating privileges on Windows through services on Sat, Nov 18, 2017 In Pentesting Tags pentesting, hacking, windows, privilege escalation
What is Return-Oriented Programming? on Tue, Nov 14, 2017 In Exploit Development, Reverse Engineering Tags exploit, return oriented programming, rop, malware