If you missed the first two parts of this article, you can find in Part I what is a shellcode, how it works and which
Author: Ionut Popescu
Introduction to Windows shellcode development – Part 2
If you missed the first part of this series, where you can read about what is a shellcode and how it works, you can find
Introduction to Windows shellcode development – Part 1
This article contains an overview of shellcode development techniques and their specific aspects. Understanding these concepts allows you to write your own shellcode. Furthermore, you
OWASP Bucharest EEE
OWASP Bucharest is happy to announce the next local event, part of OWASP EEE (Eastern European Event), a one day Security and Hacking Conference. It
My first Defcon experience
Defcon is a meta-conference which anyone passionate by IT security should attend. It is more than a conference, it is the heaven of hackers and security
Writing a Metasploit post exploitation module
The exploitation of a machine is only one step in a penetration test. What do you do next? How can you pivot from the exploited