Bad Characters Sortilege
Introduction In exploit development world there will be times where you find yourself working with an executable that enforces a very limited character set i...
Introduction In exploit development world there will be times where you find yourself working with an executable that enforces a very limited character set i...
Introduction In efforts to learn as much as I can before starting OSCE later this month, I decided to write a blog post about using Return Oriented Programmi...
Introduction RC2 is a symmetric-key block cipher which was popular in the first half of the 90s of the last century. RC2 also known as ARC2 was designed by R...
Introduction Polymorphism is a technique used to mutate code in a way that will keep the original functionality intact. For example, 1+1 and 4-2 both achieve...
Introduction In this post, we will analyze three samples of Linux x86 based shellcode generated by msfvenom using different tools. Now before going into the ...