The exploitation of a machine is only one step in a penetration test. What do you do next? How can you pivot from the exploited
Author: Ionut Popescu
Upgrade your DLL to Reflective DLL
If you want to execute code stealthily on a machine and the antivirus stands in your way, you should think about avoiding the disk because
Intercepting functions from statically linked libraries
A common technique for blackbox penetration testing of a binary application is intercepting function calls. This technique helps the pentester to properly understand how the application works
Understanding PHP Object Injection
PHP Object Injection is not a very common vulnerability, it may be difficult to exploit but it also may be really dangerous. In order to
How to intercept traffic from Java applications
During a security assessment you may need to monitor the traffic from a Java application and also to modify it. What can you do? What