Office 365 AMSI Bypass (fixed)
Microsfot fixed their detection logic, so this doesn’t work anymore.
Microsfot fixed their detection logic, so this doesn’t work anymore.
A research on why the new defender evasion modules fail to evade
When attackers have arbitrary file read access to a Linux machine, they can leverage the /proc filesystem for enumeration
A second look at the arcane art of shellcode writing
Malware analysis of a trojan downloader
Analysis of the Petya/NotPetya ransomware.
A PoC for hiding data in HTTP headers.
Cmubomb challenge writeup from the Modern Binary Exploitation course.
Bomb challenge writeup from the Modern Binary Exploitation course.
Crackme challenges writeup from the Modern Binary Exploitation course.