interesting stuff

Clean metadata from PDF file

Written by  on July 27, 2015

Metadata in files can be usted to get sensitive information about the file creator, we can easily clean that metadata using various software solutions. quick[...]

Exploit writing: Simple buffer overflow’s

Written by  on July 25, 2015

Well this post will be some kind of “buffer overflow exploiting for dummies”. In buffer overflow based exploits what we do is overwrite important[...]

Get old software for bug researching

Written by  on July 20, 2015

So, you want to be a security researcher, do you? Or maybe just wanna have some fun building cool exploits? Anyway here they come: http://www.downloadoldversion.com/ http://www.321download.com/LastFreeware http://www.oldware.org/ http://oldversion.com http://www.oldapps.com/     [...]

Backdooring windows exe’s for fun and profit – [Part 1]

Written by  on July 9, 2015

Hi there, today we are going to inject a windows cmd reverse shell from metasploit inside a simple windows executable. We’ll place our backdoor inside[...]

From reflected XSS to shell

Written by  on July 8, 2015

In this scenario we will begin with a simple and easy exploitable reflected XSS attack and then we will move to a cookie stealing scenario and the total[...]