This is just another very short usage guide for one of my little helper for pentesters and the like. During [...]
This is a short usage guide which should explain my simple wrapper for the spike fuzzer, which you can find [...]
Vulnerable software FTP server 8.0f(g) Vulnerability Local Buffer Overflow (SEH protected)-> Code Execution Time Line 01/24/2018 Vendor informed 01/30/2018 [...]
As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until [...]
While doing my preperation for the OSCE i found an exploit for the coolpalyer+ version 2.19.1 from 2009. I decided to [...]
On 27.02.2018 between 1 and 4 p.m., the Munich Chamber of Commerce and Industry is offering a roundtable discussion for [...]
The tiresome topic of passwords and their management. I am always asked how to solve this problem. Therefore, I decided [...]
The last post for my SLAE certification is about encryption of shellcode. As usual you can find all my files [...]
This task (pick up 3 shellcodes from Shell-Storm and use polymorphism to beat pattern matching) sounds really sophisticated but you [...]
Got time to read? This tasks was a bigger one. We have to pick 3 random metasploit payloads and analyze [...]