Win32 reverse shellcode - pt .1 - Locating the kernelbase.dll address
This blog post explains how to locate the kernelbase.dll address using winDbg debugger in x86 assembly
This blog post explains how to locate the kernelbase.dll address using winDbg debugger in x86 assembly
Reverse Engineering GTER using IDA Pro instead of fuzzing
This post demonstrates a DEP bypass buffer overflow against the vulnerable CloudMe v1.11.2 application
This post demonstrates the creation of a custom cryptor using the Affine Cipher for the purpose of the SLAE32 certification course
This post demonstrates the creation of polymorphic shellcodes for the purpose of the SLAE32 certification course