IT Security: Blog
Obfuscation: ByteSwapping
Obfuscation: polymorphic in-memory decoder
Obfuscation: Disguise shellcode as UUIDs
Shellcode Injection Part 4
Buffer Overflows - Intro
Shellcode Injection Part 3
Shellcode Injection Part 2
Shellcode Injection Part 1
Buffer overflow in the 64-bit stack - Part 3
Privilege escalation: Windows admin thanks to Linux
Buffer overflow in the 64-bit stack - Part 2
FatCat Attack PoC
Buffer overflow in the 64-bit stack - part 1
Security on the net
OSI layer cyber attacks
Secure passwords