Exploiting Vulnserver - pt. 1 - Reverse Engineering GTER using IDA Pro
Reverse Engineering GTER using IDA Pro instead of fuzzing
Reverse Engineering GTER using IDA Pro instead of fuzzing
This post demonstrates a DEP bypass buffer overflow against the vulnerable CloudMe v1.11.2 application
This post demonstrates the creation of a custom cryptor using the Affine Cipher for the purpose of the SLAE32 certification course
This post demonstrates the creation of polymorphic shellcodes for the purpose of the SLAE32 certification course
This post analyzes four msfvenom shellcode samples for the purpose of the SLAE32 certification course