Exploiting common Webmin vulnerabilities.
A GNU debugger command reference.
Exploiting loose comparison operations.
Triggering code execution through object deserialisation.
Configuring sensors to detect physical intrusion.
Common security issues with integer variables.
Reverse shells in x64 assembly.
Exploiting PIE enabled executables.
Using the EvilCrowRF to transmit Sub-Ghz signals.
Creating custom wordlists for use in password brute force attacks.
Interacting with GPIO’s using Python.
Executing the execve syscall on x64 Linux using Shellcode.