IT Security
Buffer overflow in the 64-bit stack - part 1
Buffer overflow in the 64-bit stack - Part 2
Buffer overflow in the 64-bit stack - Part 3
Buffer Overflows - Intro
FatCat Attack PoC
Group Managed Service Accounts
Helpful NMAP scanner commands
Host Discovery with Metasploit database
IT Security Cheat Sheets
nmap SMBv1 Scan via Script
Obfuscation: ByteSwapping
Obfuscation: Disguise shellcode as UUIDs
Obfuscation: polymorphic in-memory decoder
OSI layer cyber attacks
Privilege escalation: Windows admin thanks to Linux
Secure passwords
Security on the net
Shellcode Injection Part 1
Shellcode Injection Part 2
Shellcode Injection Part 3
Shellcode Injection Part 4
SMB Hardening