Posts

Format String Vulnerability 3 - Writing arbitrary data in memory

SLAEx86 : Egg Hunter Shellcode

SLAEx86 : Coding a custom Insertion Encoder and Decoder

SLAEx86 : Analyzing Shellcode

SLAEx86 : Polymorphic Shellcodes

SLAEx86 : Coding a custom crypter

Exploring Metasploit Hardware Bridge for Hardware and Automotive Penetration Testing

Format String Vulnerability 2 - Writing data in memory