Exploiting dynamic DNS updates.
A look at various open source C2 agents.
Exploiting common Android vulnerabilities.
Configuring VXLan’s in Linux.
Bypassing Android certificate pinning using Objection.
Identifying common security issues in mobile applications.
Performing static analysis of Python & Java code.
Exploiting Directory Junctions for local privilege escalation.
Exploiting common Webmin vulnerabilities.
A GNU debugger command reference.
Exploiting loose comparison operations.
Triggering code execution through object deserialisation.