Public Notes
  • Some ways to jump to the shellcode

    Corelan's "Exploit writing tutorial part 2" walkthrough

    April 16, 2018 - 6 minute read -
  • Stack Based Overflow Example (Windows x86)

    Corelan's "Exploit writing tutorial part 1 - Stack Based Overflows" walkthrough

    April 11, 2018 - 5 minute read -
  • SLAE: Custom Shellcode Crypter

    Simple XOR shellcode crypter

    April 5, 2018 - 3 minute read -
  • SLAE: Polymorphic Shellcodes

    Creating some polymorhic shellcodes for linux/x86

    April 5, 2018 - 5 minute read -
  • SLAE: linux_x86_shell_reverse_tcp Shellcode Analysis

    The process of "linux_x86_shell_reverse_tcp" shellcode analysis in gdb

    April 4, 2018 - 5 minute read -
  • SLAE: linux_x86_read_file Shellcode Analysis

    The process of "linux_x86_read_file" shellcode analysis in gdb

    April 3, 2018 - 3 minute read -
  • SLAE: linux_x86_exec Shellcode Analysis

    The process of "linux/x86/exec" shellcode analysis in gdb

    April 3, 2018 - 3 minute read -
  • SLAE: Writing XOR Shellcode Encoder/Decoder

    The process of creation custom XOR encoder/decoder

    April 2, 2018 - 5 minute read -
  • SLAE: Writing simple Egg Hunter

    The process of creation of simple Egg Hunter

    April 2, 2018 - 4 minute read -
  • SLAE: Writing shell_reverse_tcp shellcode

    The process of creation connect-back shellcode

    March 30, 2018 - 10 minute read -
  • SLAE: Simple shell_bind_tcp shellcode

    The process of creation port-binding shellcode

    March 28, 2018 - 12 minute read -
  • Hashcat Cheatsheet

    Some useful hashcat tips

    November 22, 2017 - 2 minute read -
  • Buffer Overflow Basics

    Some useful tips about buffer overflow exploitation

    February 28, 2017 - 3 minute read -
  • Windows Privilege Escalation

    Some useful tips about windows privesc

    January 23, 2017 - 3 minute read -
  • Metasploit Cheatsheet

    List of most common msf modules and options

    January 18, 2017 - 2 minute read -
  • Linux Privilege Escalation Cheatsheet

    Some useful tips for exploitation and privesc

    December 30, 2016 - 1 minute read -