-
Exploiting Linux Kernel Heap Corruptions (SLUB Allocator)
-
Heap Overflow: Vulnerability and Heap Internals Explained
-
Stack analysis with GDB
-
Shellcode analysis on Linux x86 32bit
-
Presenting Registers
-
Android Architecture and Pen-testing of Android applications
-
Loading Msgreen.dll to Bypass DEP Office 2010 Windows 7 Double-Click RCE Exploit
-
Executing Office 2007 Exploit on Office 2010
-
NMAP Scripting Example
-
Hello World: C, Assembly, Object File and Executable
-
Calling Conventions
-
Exceptions In Injected Code
-
API Hooking with Microsoft Detours
-
Executable Code Injection
-
VMWare ESX Audit & Analysis, Part 1
-
PDF File Format: Basic Structure
-
Transforming your Android Phone into a Network Pentesting Device
-
Hacking PDF: util.prinf() Buffer Overflow: Part 2
-
Hacking PDF: util.prinf() Buffer Overflow: Part 1
-
X86 Assembly Language, Part 2