Exploit/Zero Day Discovery and Development

◽️ Fuzzing
◽️ Buffer Overflow Attacks
◽️ Pivoting From One Compromised Windows Machine To Another Box Using RPivot
◽️ How To Offensively Pass Reverse Shells From A Cloud Server To Your Local Home PC Using SSH Tunneling
◽️ Concealing Your Remote Reconnaissance, Scanning, And Crawling Using Tor-over-VPN
◽️ How To Attack A Corporate Ethernet LAN From A Wi-Fi Hotspot Using Proxy ARP Daemons
◽️ Introduction to Egghunters for situations of limited buffer space
◽️ ROP-Chaining to defeat Data Execution Prevention
◽️ Reverse and Bind Shells
◽️ Post Exploitation
◽️ Exploit Development
◽️ Debugging Crashed Applications
◽️ edb (Evan's Debugger)
◽️ gdb (GNU Debugger)

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

No responses yet

Write a response