Approved 2024/03/15 15:08 by psycore (version: 2) | Approver: psycore IT Security Buffer overflow in the 64-bit stack - part 1Buffer overflow in the 64-bit stack - Part 2Buffer overflow in the 64-bit stack - Part 3Buffer Overflows - IntroFatCat Attack PoCGroup Managed Service AccountsHelpful NMAP scanner commandsHost Discovery with Metasploit databaseIT Security Cheat Sheetsnmap SMBv1 Scan via ScriptObfuscation: ByteSwappingObfuscation: Disguise shellcode as UUIDsObfuscation: polymorphic in-memory decoderOSI layer cyber attacksPrivilege escalation: Windows admin thanks to LinuxSecure passwordsSecurity on the netShellcode Injection Part 1Shellcode Injection Part 2Shellcode Injection Part 3Shellcode Injection Part 4SMB Hardening