Interactive Guide to Buffer Overflow exploitation on Wed, Feb 19, 2025 In Exploit Development, Reverse Engineering Tags exploit, buffer overflow, malware
DACL Permissions Overwrite Vulnerability in Check Point VPN on Sun, Jun 23, 2019 In Bug Hunting Tags pentesting, hacking, windows, check point, exploit, cve, privesc
Privilege Escalation vulnerability in CrashPlan on Fri, Jun 21, 2019 In Bug Hunting Tags pentesting, hacking, windows, crashplan, exploit, cve, privesc
Debugging Windows services on Fri, Jan 25, 2019 In Exploit Development Tags pentesting, hacking, windows, debugging, exploit, windbg
Interactive Beginner's Guide to ROP on Mon, Dec 17, 2018 In Exploit Development, Reverse Engineering Tags exploit, return oriented programming, rop, malware
What is Return-Oriented Programming? on Tue, Nov 14, 2017 In Exploit Development, Reverse Engineering Tags exploit, return oriented programming, rop, malware