• No products in the cart.



Shellcode: From a Simple Bug to OS Control
By Amr Thaber

Exploiting Format Strings with Python
By Craig Wright

DPA Exploitation and GOTs with Python
By Craig Wright

Starting to Write Your Own Linux Schellcode
By Craig Wright

Beyond Automated Tools and Frameworks: the shellcode injection process 
By Craig Wright

Understanding conditionals in shellcode
By Craig Wright

Taking control, Functions to DLL injection
By Craig Wright

Smashing the Stack
By Marco Balduzzi and Mariano Graziano

Smashing the Stack 2
By Marco Balduzzi and Mariano Graziano

Exploit a Software with Buffer Overflow Vulnerability and Bypassing Aslr Protection
By Ahmed Sherif El-Demrdash

Reversing EXE with OllyDbg
By Nilesh Kumar

A Quick “Hands On” Introduction to Packing
By Alain Schneider

Hacking Applets: A Reverse Engineering Approach
By Nilesh Kumar and Ronnie Johndas

Hijacking Software Updates with Evilgrade
By Mourad Ben Lokhua

Direct Object Reference or, How a Toddler Can Hack Your Web Application
By Nick Nikiforakis

How to Recover Passwords from a Memory Dump
By Daniel Dieterle

Creating a Fake Wi-Fi Hotspot to Capture Connected Users Information
By Roberto Saia

Deceiving Defenses with Nmap Camouflaged Scanning
By Roberto Saia

Overriding Function Calls in Linux
By Umair Manzoor

Cracking Java Applications with AOP exploits (part 1)
By Daniel Drozdzewski

Cracking Java Applications with AOP Exploits (part 2)
By Daniel Drozdzewski

Cisco IOS Rootkits and Malware: A practical guide
By Jason Nehrboss

Easy Network Security Monitoring with Security Onion
By Daniel Dieterle

Inspecting Https Traffic on Gateways
By Kishin Fatnani

Detecting Ipv6 Rogue Router Incidents Using Bro NSM
By Matti Mantere

The Gentoo Hardened Project: Or How to Minimize Exploits Risks
By Jesus Rivero


August 28, 2014

Leave a Reply

Notify of

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013

Privacy Preference Center


Overall, cookies help us provide you with a better website, by enabling us to monitor which pages you find useful and which you do not. A cookie in no way gives us access to your computer or any information about you, other than the data you choose to share with us.

_global_lucky_opt_out, _lo_np_, _lo_cid, _lo_uid, _lo_rid, _lo_v, __lotr, _ga, _gid, _gat, AMP_TOKEN, _gac_, __utma, __utmt, __utmb, __utmc, __utmz, __utmv, __utmx, __utmxx, _gaexp