Recent posts

Bad Characters Sortilege

1 minute read

Introduction In exploit development world there will be times where you find yourself working with an executable that enforces a very limited character set i...

ROPing the Stack

9 minute read

Introduction In efforts to learn as much as I can before starting OSCE later this month, I decided to write a blog post about using Return Oriented Programmi...

RC2 Shellcode Crypter in Python - Linux x86

3 minute read

Introduction RC2 is a symmetric-key block cipher which was popular in the first half of the 90s of the last century. RC2 also known as ARC2 was designed by R...

Polymorphic Shellcode - Linux x86

3 minute read

Introduction Polymorphism is a technique used to mutate code in a way that will keep the original functionality intact. For example, 1+1 and 4-2 both achieve...

Disecting Msfvenom Shellcode - Linux x86

10 minute read

Introduction In this post, we will analyze three samples of Linux x86 based shellcode generated by msfvenom using different tools. Now before going into the ...