My content:

Youtube: 0x4ndr3
Blog:
- Medium
- my older blog

I've also contributed to the Exploit Database and Google Hacking Database with a few shellcodes
that were developed while I was writing some blog posts on my previous blog, for the
SecurityTube Linux Assembly (x64) Expert - SLAE64 exam assignments.

Some of my work:
- Presentations at conferences (with videos)
- Starting dynamic analysis on a Windows x64 rootkit
- Exploit Development | Format Strings Series 5/6 - Memory leak + ASLR bypass
- Assembly "wrapping": a technique for anti-disassembly
- Polymorphic and smaller versions of three shell-storm‘s x64 shellcodes, including the smallest execve /bin/sh
- x64 Egg hunting in Linux systems
- Twofish Crypter with DNS (CName) password retrieval, x64 shellcode decryption, and execution
- JSgen.py - bind and reverse shell JS code generator for SSJI in Node.js with filter bypass encodings
- Bypassing CSRF tokens with Python's CGIHTTPServer to exploit SQLi

Back ...