Shellcode: From a Simple Bug to OS Control
By Amr Thaber

Exploiting Format Strings with Python
By Craig Wright

DPA Exploitation and GOTs with Python
By Craig Wright

Starting to Write Your Own Linux Schellcode
By Craig Wright

Beyond Automated Tools and Frameworks: the shellcode injection process 
By Craig Wright

Understanding conditionals in shellcode
By Craig Wright

Taking control, Functions to DLL injection
By Craig Wright

Smashing the Stack
By Marco Balduzzi and Mariano Graziano

Smashing the Stack 2
By Marco Balduzzi and Mariano Graziano

Exploit a Software with Buffer Overflow Vulnerability and Bypassing Aslr Protection
By Ahmed Sherif El-Demrdash

Reversing EXE with OllyDbg
By Nilesh Kumar

A Quick “Hands On” Introduction to Packing
By Alain Schneider

Hacking Applets: A Reverse Engineering Approach
By Nilesh Kumar and Ronnie Johndas

Hijacking Software Updates with Evilgrade
By Mourad Ben Lokhua

Direct Object Reference or, How a Toddler Can Hack Your Web Application
By Nick Nikiforakis

How to Recover Passwords from a Memory Dump
By Daniel Dieterle

Creating a Fake Wi-Fi Hotspot to Capture Connected Users Information
By Roberto Saia

Deceiving Defenses with Nmap Camouflaged Scanning
By Roberto Saia

Overriding Function Calls in Linux
By Umair Manzoor

Cracking Java Applications with AOP exploits (part 1)
By Daniel Drozdzewski

Cracking Java Applications with AOP Exploits (part 2)
By Daniel Drozdzewski

Cisco IOS Rootkits and Malware: A practical guide
By Jason Nehrboss

Easy Network Security Monitoring with Security Onion
By Daniel Dieterle

Inspecting Https Traffic on Gateways
By Kishin Fatnani

Detecting Ipv6 Rogue Router Incidents Using Bro NSM
By Matti Mantere

The Gentoo Hardened Project: Or How to Minimize Exploits Risks
By Jesus Rivero


July 15, 2019
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013