Return to Libc: Linux Exploit Development
This blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
Return to Libc: Linux Exploit Development
Weaponizing Windows Binaries and Scripts (LOLBAS): What's Old Is New Again
Automated Obfuscation of Windows Malware and Exploits Using O-LLVM
Ransomware Attacks Are on the Rise, Should You Pay the Ransom?
The CISO asked me to run Ransomware on his laptop
Meltdown and Spectre: Quick Overview and Next Steps
Language Interpreters and Post-Exploitation
Running Metasploit Shellcode in a Process
Language Interpreters and Post-Exploitation
Running Metasploit Shellcode in a Process