- Multilevel attack with java applet by Double Zero
- Exploit development-Double Zero
- Past, Present, Future of Windows Exploitation
- Old vul s/w for practicing(Eberly)
- Search Engine for Exploits (Godwin Austin)
- Learning BufferOverFlow
- Windows Link exploit (shortcut file) race condition tackling--"vinnu"
- Heap Spray:- Slipping CPU to our pocket--by "vinnu"
- Smashing the stack in 2010
- Evading AV Signatures...Derailing the Antivirus--"vinnu"
- How Shall I learn Exploitation Techniques?
- Things to note about DLL Hijacking
- Apple QuickTime remote code exec vulnerability..."vinnu"
- local buffer overflow, a different scenario
- HPP Injection
- EXE planting pulling the levers of windows..."vinnu"
- Porting Exploits to Metasploit
- Alternative JVM Xploit - Exploiting JVM on Chrome - A story
- Death of an ftp client / Birth of Metasploit modules
- Fusion of Xploits - Multiplexing exploitation
- New Windows zero-day flaw bypasses UAC
- Microsoft windows SAM flaws
- Antivirus/ Firewall Evasion Techniques: Evolution of Download Deploy Shellcode
- DLL Injection
- Understanding stack overflows!!!!
- simple-reverse-icmp-shel Reverse Shelll
- Drive-by-Cache & Stearing remote Exploitation locally
- How to crash EXPLORER.EXE on all Windows versions
- Drive by download Shellcode for win7
- ASLR DEP bypassing techniques
- Shellcode Anatomy
- Advanced Windows Buffer Overflows
- Digging Inside VxWorks OS and Firmware - Holistic Security
- Exploit Developement through Heap Spray Technique
- JBoss Exploitation: Revealing the weakness within
- Format String Exploits -- Part1!!!
- Shellcoding--Why custom shellcodes can be useful!!!
- Very Nice Wiki On Exploit Development and references..
- SEH overflow exploit POC
- Bypassing HW-DEP on Windows Xp Sp3 !!!
- Bypassing Windows 7 Kernel ASLR
- MS Patch Tuesday Vs Exploit Wednesday
- Exploiting Xion mp3 player -- Using custom unicode decoder
- Buffer overflows in malloc space (Basic Heap Overflows) - Part I
- Buffer overflows in malloc space (Basic Heap Overflows) - Part II
- Windows 8 DEP bypass
- A note on Metasploit's EXITFUNC
- Heap Spraying Demystified
- The Art of Win32 Shellcoding
- Reliable Windows 7 Exploitation: A Case Study
- A Partial Technique Against ASLR - Multiple O/Ss
- Binary Analysis of Oracle Java CVE: 2012-0500 and Alternate Exploitation on Win|Linux
- Porting Public exploits to Metasploit.
- LFI Exploitation - revealing the working codes --- "vinnu"
- Defeating anti viruses with dorky techniques
- Google talk - Crash Via Avtar Upload
- Anatomy of my first and second 0-day!
- Buffer Overflow question
- EAX overflow(An Idea)
- Exploitation Basics: Two Blogposts
- Win7 64bit - NO ASLR/DEP bypass required..."vinnu"
- Finding buffer overflow/zero days
- web fuzzers in backrack
- [ personal knowledge issue] Having trouble compiling this one
- Not really exploitable?
- IE6 use-after-free PoC
- Need Help with String Format Vulnerabilities and Exploitation
- Evocam Remote BOF exploit | Mac OS exploitation
- Windows 7 64bit exploitation using LdrHotPatchRoutine and bypassing ASLR+DEP
- Need help to learn Crash Analysis and Exploitation
- Introduction to Windows Kernel Security Research
- UAF object poisoning
- Fuzzing software and finding a bug that will lead to RCE
- Heap Overflow Windows XP SP3/7
- How to use CVE-2013-3906
- EMET 4.1 simExecFlow
- python socket.recvfrom_into() remote buffer overflow
- offbyone question
- ZCR Shellcoder
- Oracle out-of-band release for Java SE Vulnerability
- Plugins - SafeSEH, DEP, ASLR, GS for all loaded modules
- Checking Executables for ASLR and DEP support
- Ruby Documentation for Metasploit msf code development