Rezultati pretraživanja
  1. 30. pro 2018.
  2. 15. kol 2019.

    Began curating a list of Hyper-V exploitation resources, hope it can be of use to anyone interested in starting Hyper-V security research:

  3. 2. velj
  4. Spread the word! Registrations for classes at spring and are now open! Check our schedules page for info:

  5. 30. sij
  6. If you want to learn more about using shellcode and techniques, check out these training courses 🤩

  7. Day 1/60 Modul 1: finished - discovered a new tool (not burp suite 😅) && really looking forward to the next Modul and first stuff 😎

  8. 27. sij
  9. 25. sij

    Interactive shellcoding environment to easily craft shellcodes

  10. 23. sij

    CTF framework and exploit development library

  11. 23. sij

    PEDA - Python Exploit Development Assistance for GDB

  12. 24. pro 2019.

    Master exploitation with and Max Kamper at . Upgrade your skills from to and learn modern exploitation. Take both trainings back-to-back: 💥

  13. 18. pro 2019.

    Exploit bugs in & at when you sign up for Advanced Exploitation by of . Upgrade your skills and master modern exploitation techniques. 📢 Up to 25% OFF before Dec 31:

  14. Black Friday Sale: If you are thinking to take the Advanced Software Exploitation course, now it's the time!! Get 20% off the ASE course with the discount code BLACKFRIDAY2019.

  15. 28. lis 2019.

    TIL writing exploit () is a lot easier when you don't use regexes and use `new DOMParser().parseFromString(xhttp.response, "text/html");` instead! xhttp here is the xmlhttprequest response.

  16. 12. lis 2019.
  17. 9. lis 2019.

    Done with 's exploit development adanced training. This one besides 's are really the best out there. Now it's all practice practice practice.

  18. 28. ruj 2019.

    All of the props this week to for an amazing job teaching SANS SEC760. Very excited to have him on board. He’s also gonna take over some authorship for me! Good things to come.

  19. 21. ruj 2019.

    A curated list of fuzzing resources ( Books, courses - free & paid, videos, tools, tutorials & vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.