Blocking outbound docker traffic using an IPTables firewall.
Bypassing DEP & ASLR in Linux
Bypassing DEP & ASLR using pointer leakage and return orientated programming.
Format String Exploitation
A quick tutorial on exploiting format string vulnerabilities to read and write memory.
Credential Interception Using Malicious SMB Shares
How to intercept NTLM-SSP hashed credentials for offline cracking.