An introduction to creating a kernel debugging environment with WinDbg and IDA to analyze and exploit a vulnerable kernel driver.
An introduction to utilizing Return Oriented Programming to defeat Data Execution Prevention.
My thoughts on the Cracking The Perimeter course/OSCE Exam and how I came to learn that one must learn to walk before learning to run.
Reusing an existing socket connection to add a buffer of a user defined length.
Exploit Development: 0day! Admin Express v126.96.36.1995 Folder Path Local SEH Alphanumeric Encoded Buffer Overflow
A 0day I found in an application called Admin Express, how to, by hand, alphanumerically encode shellcode, align the stack properly, and explaining the integ...