Deceptive Security
  • No menu assigned
Press enter to begin your search
ProgrammingWalkthrough

Daily Coding Problem 1 — Solution Walkthrough

By Kevin Kirsche | Programming, Walkthrough | No Comments
no image added yet.
Buffer OverflowWalkthrough

Vulnserver KSTET WS2_32 Recv Function Re-Use

By Kevin Kirsche | Buffer Overflow, Walkthrough | 4 Comments
no image added yet.
automationWalkthrough

Patching a binary to disable ASLR using Python

By Kevin Kirsche | automation, Walkthrough | No Comments
no image added yet.
Buffer OverflowWalkthrough

QuickZip 4.60.019 SEH Buffer Overflow

By Kevin Kirsche | Buffer Overflow, Walkthrough | No Comments
no image added yet.
Walkthrough

Using Python’s struct.pack function in exploit development

By Kevin Kirsche | Walkthrough | No Comments
no image added yet.
SLAE-x86

Creating an AES256-GCM Shellcode Crypter

By Kevin Kirsche | SLAE-x86 | No Comments
no image added yet.
SLAE-x86

Creating 3 Polymorphic Shellcode Variants of Shell-Storm samples

By Kevin Kirsche | SLAE-x86 | No Comments
no image added yet.
SLAE-x86

Analyzing Metasploit’s linux/x86/adduser payload

By Kevin Kirsche | SLAE-x86 | No Comments
no image added yet.
SLAE-x86

Analyzing Metasploit’s linux/x86/read_file payload

By Kevin Kirsche | SLAE-x86 | No Comments
no image added yet.
SLAE-x86

Analyzing Metasploit’s linux/x86/shell_find_tag payload

By Kevin Kirsche | SLAE-x86 | No Comments
1 2 3 Next

Categories

  • automation
  • Buffer Overflow
  • Privilege Escalation
  • Privileged Exploit
  • Programming
  • Public Exploit Release
  • SLAE-x86
  • Walkthrough

© 2017–18 Deceptive Security — All Rights Reserved