AppSec… First Stack Buffer Overflow to modify Variable 30 Nov 201930 Nov 2019 Stack0: https://exploit.education/protostar/s... Intel Reference: intel.de/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-instruction-set-reference-manual-325383.pdf
Attacks… Reverse Engineering Router Firmware 3 Oct 201911 Oct 2019 Reverse engineering, also called back engineering, is the process by which a man-made object is deconstructed to reveal its designs, architecture, or to extract knowledge from the object; similar to…
#career… Best Linux Distros for Ethical Hacking and Penetration Testing 1 May 20191 May 2019 Here is a list of some top Linux distro for ethical hacking and penetration testing that will surely help you to pick one that best fits your need. Kali Linux:…
AppSec… Ghidra – First impressions of the NSA Reverse Engineering Tool 13 Mar 201910 Oct 2019 Ghidra is a reverse engineering tool, written in Java, that was recently open-sourced by the National Security Agency (NSA). You can find the Github page here and the download link…
#Metasploit… Exploring the Hacker Tools of Mr. Robot 15 Sep 201525 Aug 2019 Over the years the most famous hacking tool that has made it into the movies is Nmap. When producers of a movie actually try to put a dose of reality…