Reverse engineering x64 binaries with Radare2 - Enabling code execution on Stack
DEP and Execution on the stack Hello again my dear reverse engineers-in-progress. In the previous post on these series we ...
Threat intelligence analyst, security enthusiast and constant learner.
Read about meDEP and Execution on the stack Hello again my dear reverse engineers-in-progress. In the previous post on these series we ...
Hello again my dear friends. And congratulations if you got as far as here, it’s been more than 20 tutorials so far and we...
And after a very well deserved rest, here we go again. While these tutorials are generally aimed at developing skills in r...
About shodan Shodan.io is the world known search engine that is continously indexing ipv4/ipv6 hosts connected to the inte...
You see, it’s been a while and together we’ve learned a lot of things about the C language and it’s adventures inside the ...
“Shells” Today I wanto to introduce a small and simple idea, to complement what we’ve been learning on these past posts. ...
Buckle up kids cause this post is going to be LONG. About Winsock In computing, the Windows Sockets API (WSA), later sho...
Performing get requests with UNIX sockets Sockets are the very fundamentals of networking in any operating system. You ca...
Secure device acquisitions It is very important to remark that our first interaction with the device and therefore the or...