Beating Windows Defender. Analysis of Metasploit’s new evasion modules.
A research on why the new defender evasion modules fail to evade
A research on why the new defender evasion modules fail to evade
When attackers have arbitrary file read access to a Linux machine, they can leverage the /proc filesystem for enumeration
A second look at the arcane art of shellcode writing
Malware analysis of a trojan downloader
Analysis of the Petya/NotPetya ransomware.
A PoC for hiding data in HTTP headers.
Cmubomb challenge writeup from the Modern Binary Exploitation course.
Bomb challenge writeup from the Modern Binary Exploitation course.
Crackme challenges writeup from the Modern Binary Exploitation course.
Introduction to the arcane art of shellcode writing.