Blog

Got time to read? This tasks was a bigger one. We have to pick 3 random metasploit payloads and analyze [...]

9. October 2017

Hey ho, it’s time for some low-level shellcode encoding. After going through the encoder examples of the SLAE material I [...]

9. October 2017

Ready for the next level? – Method to exploit software even with small space for shellcode: EggHunting The third task [...]

9. October 2017

Welcome back to my second post for the SLAE certification. Today we are going to build a reverse_shell shellcode and [...]

9. October 2017

After gaining my OSCP in June I decided to go deeper into exploitDev and shellcoding. And here we are, this [...]

9. October 2017

Every day, millions of people become victims of cybercrime. These are usually not targeted by professional hackers, but fall victim [...]

3. October 2017

Today I would like to share my experience with OSCP from the guys at Offensive Security. Why OSCP? There are [...]

11. August 2017

UK – German Cyber-Security Forum On 26.07.2017, the second Cyber-Security Forum of the British Consulate and the Munich Security Network [...]

30. July 2017

Almost every day, users become victims of so-called phishing emails. Therefore, in this short post, I would like to point [...]

14. July 2017

  “Who owns my data?” On 29.06.2017, a series of lectures on the above topic was held at the entrepreneurial [...]

13. July 2017