Bypassing NX on 64-bit Linux.
Bypassing DEP & ASLR in Linux
Bypassing DEP & ASLR using pointer leakage and return orientated programming.
Format String Exploitation
A quick tutorial on exploiting format string vulnerabilities to read and write memory.
Kali Linux – Ensuring Traffic is Only Sent via OpenVPN
A guide on configuring Kali so all network traffic is routed over an OpenVPN connection.
Credential Interception Using Malicious SMB Shares
How to intercept NTLM-SSP hashed credentials for offline cracking.
Windows 10 Software Restriction Policies
Configuring Software Restriction Policies (SRP) in Windows 10.
Extracting Windows Credentials Using Native Tools
How to extract credentials from Windows systems using built in commands.
What You Need to Know About Kerberoasting
An overview of Kerbroasting to extract service account credentials.