This is a short usage guide which should explain my simple wrapper for the spike fuzzer, which you can find [...]
As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until [...]
While doing my preperation for the OSCE i found an exploit for the coolpalyer+ version 2.19.1 from 2009. I decided to [...]
Am 27.02.2018 zwischen 13 und 16 Uhr bietet die IHK München zusammen mit Experten aus dem Bereich Informationssicherheit eine Gesprächsrunde [...]
Das leidige Thema Passwörter und deren Verwaltung. Ich werde immer wieder gefragt, wie man dieses Problem lösen kann. Daher habe [...]
The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files [...]
This task (pick up 3 shellcodes from Shell-Storm and use polymorphism to beat pattern matching) sounds really sophisticated but you [...]
Got time to read? This tasks was a bigger one. We have to pick 3 random metasploit payloads and analyze [...]
Hey ho, it’s time for some low-level shellcode encoding. After going through the encoder examples of the SLAE material i [...]
Ready for the next level? – Method to exploit software even with small space for shellcode: EggHunting The third task [...]