Using relative JMP instructions to escape small buffers.
Bypassing DEP & ASLR in Linux
Bypassing DEP & ASLR using pointer leakage and return orientated programming.
Format String Exploitation
A quick tutorial on exploiting format string vulnerabilities to read and write memory.
Kali Linux – Ensuring Traffic is Only Sent via OpenVPN
A guide on configuring Kali so all network traffic is routed over an OpenVPN connection.
Credential Interception Using Malicious SMB Shares
How to intercept NTLM-SSP hashed credentials for offline cracking.
Windows 10 Software Restriction Policies
Configuring Software Restriction Policies (SRP) in Windows 10.