|
You are here |
cocomelonc.github.io | ||
| | | | |
www.thexero.co.uk
|
|
| | | | | A post and review of the experience of hosting an exploit development workshop at BSides London 2014. | |
| | | | |
www.politoinc.com
|
|
| | | | | Learn From Industry Experts. Our experts have over 100 combined years of cyber security experience in both the public and private sectors. The training we offer ranges from basic best practices and guidelines that should be a part of every organization's required annual training to developing custom exploits and more. We can even create and tailor our training to meet the needs of your organization. Contact us to learn more about how our training can give you the edge you need. | |
| | | | |
wsummerhill.github.io
|
|
| | | | | For a while now, people have been using alternative callback methods in C/CSharp payloads instead of the vanilla CreateThread() or similar Windows API functions. There were several good repos on GitHub that can be used as resources to execute shellcode via Windows callback functions which were very interesting. | |
| | | | |
yordi.me
|
|
| | | My solution for Advent of Code 2025 day 3. | ||