• Boot camps & training
  • Awareness & anti-phishing
  • Community
Infosec Resources Home
  • Topics
    • Cyber ranges
      Threat Intelligence
      General security
      Hacking
      Healthcare information security
    • Penetration testing
      Phishing
      Data breach
      Insider threat
    • Capture the flag (CTF)
      Data recovery
      DoD 8570
      Security awareness
      + View All
  • Certification prep
    • CISSP
      CCSP
      CGEIT
      CEH
      CCNA
    • CISA
      CISM
      CRISC
      A+
      Network+
    • Security+
      CASP+
      PMP
      CySA+
    • CMMC
      CSIH
      Microsoft Azure
      Other
      + View All
  • Career guidance
    • IT auditor
      Cybersecurity architect
      Cybercrime investigator
      Penetration tester
    • Cybersecurity consultant
      Cybersecurity analyst
      Cybersecurity engineer
      Cybersecurity manager
    • Incident responder
      Information security auditor
      Information security manager
      + View All
  • Events
  • Podcast
  • About
    • Contributors
  • Search
  • Main Menu

D12d0x34X

Rashid Bhat is an Independent Security Researcher as well as a contributor to InfoSec Institute. His areas of expertise include exploitation, malware analysis and reverse engineering. Twitter: http://twitter.com/raashidbhatt

Exploit development February 9, 2019 D12d0x34X
Return Oriented Programming (ROP) Attacks
According to Wikipedia, "Return-oriented programming (also called "chunk-borrowing à la Krahmer") is a computer security exploit technique in which the attacker...
Hacking April 11, 2013 D12d0x34X
InfoSec Institute Interview with Rahul Sasi
Rahul Sasi works as a security researcher for garage4hackers.com. Rahul is a respected name in the security industry. Last year, he researched about possible...
Infosec Resources Home

Join our newsletter

Get the latest news, updates & offers straight to your inbox.
  • This field is for validation purposes and should be left unchanged.
© 2021 Infosec Resources
  • Privacy Policy
Topics
  • Cyber ranges
  • Threat Intelligence
  • General security
  • Hacking
  • Healthcare information security
  • Penetration testing
  • Phishing
  • Data breach
  • Insider threat
  • Capture the flag (CTF)
  • Data recovery
  • DoD 8570
  • Security awareness
  • + See All Topics
Certifications
  • CISSP
  • CCSP
  • CGEIT
  • CEH
  • CCNA
  • CISA
  • CISM
  • CRISC
  • A+
  • Network+
  • Security+
  • CASP+
  • PMP
  • CySA+
  • CMMC
  • CSIH
  • Microsoft Azure
  • Other
  • + See All Certifications
CyberSecurity Careers
  • IT auditor
  • Cybersecurity architect
  • Cybercrime investigator
  • Penetration tester
  • Cybersecurity consultant
  • Cybersecurity analyst
  • Cybersecurity engineer
  • Cybersecurity manager
  • Incident responder
  • Information security auditor
  • Information security manager
  • + See All Careers