🇧🇪 Belgian Roots. Global Impact. 🌍

Corelan is more than just 🍟, 🍺 & 👶🏼🚿.

We offer world-class Exploit Development Training for Windows:
🔹 Stack-based Exploit Dev
🔹 Heap Exploit Development Masterclass

Crafted in 🇪🇺, respected worldwide 🌐.

Built by a researcher, for researchers 🧠.

Support European excellence in cybersecurity!

🎯 Sign up here → https://bit.ly/corelan-training

#CyberSecurity #ExploitDevelopment #Corelan #InfoSec #InvestInEurope #MadeInBelgium #Heap #Stack #Windows

ROP Chains - Euler Neto - Medium

Since my main focus is malware analysis, I’m very interested in reverse engineering. I was reading about how to use this topic in binary exploitation and saw the concept of ROP chain. ROP is an…

Medium

Already enjoying the https://exploits.club/ newsletter. Don't let the "coming soon..." website fool you, the content is high quality.

#exploitdev #ExploitDevelopment

Exploits Club

Ready to navigate the treacherous waters of buffer overflows?

Check my latest blog post: "Wherein We Study A Buffer Overflow And Ready Our Aim: testing the waters"

We'll now be ready to actually exploit the return address and use it for our own means.

Consider this the first step before shellcoding gallore.

🦶 Dip your toe here: https://dreaming-of-dragons.blogspot.com/2024/10/wherein-we-study-buffer-overflow.html

#Shellcode #CyberSecurity #ReverseEngineering #LowLevelProgramming #TechBlog #ExploitDevelopment

Wherein We Study A Buffer Overflow Prepare Our Aim: testing the waters

embedded programming dreaming of dragons

Ready for the troubled waters of shellcode? I'm not. Not just yet, at least. But I'm by the shore and telling you about it in my latest blog post: "Wherein We Wade Through A Shellcode Shore: before the dive

"

Spoiler alert: shellcode remains relevant (and fun).

👉 Check out: https://dreaming-of-dragons.blogspot.com/2024/10/wherein-we-wade-through-shellcode-shore.html

#Shellcode #CyberSecurity #ReverseEngineering #LowLevelProgramming #TechBlog #ExploitDevelopment

Wherein We Wade Through A Shellcode Shore: before the dive

embedded programming dreaming of dragons

We’ve just published the third and final part in our new series on Windows kernel driver vulnerability research and exploitation.

Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3:
https://security.humanativaspa.it/exploiting-amd-atdcm64a-sys-arbitrary-pointer-dereference-part-3/

In the previous articles, we covered the discovery of an arbitrary MSR read and an arbitrary pointer dereference vulnerability, and successfully confirmed them by putting together two PoCs. This time, we will craft a full exploit that chains both vulnerabilities to enable all privileges on Windows. Happy hacking!

#HumanativaGroup #HNSecurity #VulnerabilityResearch #ExploitDevelopment #Windows

Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3 - hn security

In the previous part of the […]

hn security

Here’s a collection of the #SecurityAdvisories that I’ve published over the years:

https://github.com/0xdea/advisories

If you’re interested in #VulnerabilityResearch and #ExploitDevelopment, on @github and on the @hnsec blog you can also find a trilogy of talks on these topics that I delivered between 2019 and 2021:

https://github.com/0xdea/raptor_infiltrate19

https://github.com/0xdea/raptor_infiltrate20

https://github.com/0xdea/raptor_romhack21

I hope you’ll enjoy them!

GitHub - 0xdea/advisories: A collection of my public security advisories.

A collection of my public security advisories. Contribute to 0xdea/advisories development by creating an account on GitHub.

GitHub

Sometimes you write a quick, dirty & fugly thing and immediately feel disgusted by it. But it works, so does it matter in the end?

#hacking #exploitdevelopment #python

How common is RC4 vs. RC5 in the wild? I assume there's still plenty of vulnerable legacy software out there that's still using RC4. Would still supporting RC4 be useful for writing exploits or diminishing returns?
#exploitdev #ExploitDevelopment
I want to share my thoughts on something I find discomforting. When I decided to work at cybersecurity field, I wanted to become a vulnerability researcher and exploit developer, because I found these fields mentally challenging. BUT, when I found out, working for law enforcement/military and intelligence services is a norm in these fields (individually or with VR firms), I was like "lol WHAT??". If I hadn't found out this truth, I would blindly educate myself to become competent in these fields, and I would waste a LOT of my time. How is this not being mentioned when talking about these fields? Is it normal to assume everybody potentially is ok about working for these organizations? Also, punk hacker image which a lot of people enjoy became a joke to me after this truth. 💔 #cybersecurity #vulnerabilityresearch #exploitdevelopment #infosec #cyberpunk