Approved 2024/03/15 15:10 by psycore (version: 2) | Approver: psycore IT Security: Blog Obfuscation: ByteSwappingObfuscation: polymorphic in-memory decoderObfuscation: Disguise shellcode as UUIDsShellcode Injection Part 4Buffer Overflows - IntroShellcode Injection Part 3Shellcode Injection Part 2Shellcode Injection Part 1Buffer overflow in the 64-bit stack - Part 3Privilege escalation: Windows admin thanks to LinuxBuffer overflow in the 64-bit stack - Part 2FatCat Attack PoCBuffer overflow in the 64-bit stack - part 1Security on the netOSI layer cyber attacksSecure passwords