The Armored Code
A blog talking about offensive and defensive security and how to craft software in a secure way
Backflip into the stack
During my OSCE journey I came across an interesting technique to jump backwards into the very beginning of the buffer injected on the vulnerable process.
19 Mar 2019
A closer look to msf-egghunter
The egghunting is a technique used in exploit writing to deal with evil shellcode to be placed in a memory location different from the one we are redirected via EIP...
22 Feb 2019
Digging into Vulnserver: fuzzing it
Vulnserver is a Win32 application built to simulate a TCP/IP server listening on port 9999 and accepting commands from unauthenticated clients.
15 Feb 2019
Getting root: Matrix
It was last year when I received the email saying I passed the Penetration testing with Kali Linux course and eventually I became an OSCP guy.
28 Jan 2019
How to calculate your network address in CIDR notation
Sometime I need to quick nmap the network just right cable plug. Since I’m lazy I created a simple bash script to calculate the network address in CIDR notation, starting...
15 Jan 2019
The shellerate project: yet another framework for shellcode generation
Last summer, as I told on Codice Insicuro, my Italian blog about cybersecurity and related, I took the x86 Assembly Language and Shellcoding on Linux course and related certification.
08 Jan 2019
Never miss a
from us, subscribe to our newsletter