Bypass ASLR with partial EIP overwrite

Written by  on July 30, 2015

Hi there, here we’ll be avoiding ASLR with an interesting technique. For those who don’t know, ASLR means address space layout randomization[...]

Basic AV bypass

Written by  on July 28, 2015

Hi there, today we’ll be evading antivirus by using a basic xor stub. Firs of all, select your favourite RAT or MALWARE and copy that, then scan[...]

Clean metadata from PDF file

Written by  on July 27, 2015

Metadata in files can be usted to get sensitive information about the file creator, we can easily clean that metadata using various software solutions. quick[...]

Exploit writing: Simple buffer overflow’s

Written by  on July 25, 2015

Well this post will be some kind of “buffer overflow exploiting for dummies”. In buffer overflow based exploits what we do is overwrite important[...]

Get old software for bug researching

Written by  on July 20, 2015

So, you want to be a security researcher, do you? Or maybe just wanna have some fun building cool exploits? Anyway here they come:     [...]