Exploiting Directory Junctions for local privilege escalation.
Exploiting common Webmin vulnerabilities.
A GNU debugger command reference.
Exploiting loose comparison operations.
Triggering code execution through object deserialisation.
Configuring sensors to detect physical intrusion.
Common security issues with integer variables.
Reverse shells in x64 assembly.
Exploiting PIE enabled executables.
Using the EvilCrowRF to transmit Sub-Ghz signals.
Creating custom wordlists for use in password brute force attacks.
Interacting with GPIO’s using Python.