My content:
Youtube: 0x4ndr3 Blog: - Medium - my older blog I've also contributed to the Exploit Database and Google Hacking Database with a few shellcodes that were developed while I was writing some blog posts on my previous blog, for the SecurityTube Linux Assembly (x64) Expert - SLAE64 exam assignments. Some of my work: - Presentations at conferences (with videos) - Starting dynamic analysis on a Windows x64 rootkit - Exploit Development | Format Strings Series 5/6 - Memory leak + ASLR bypass - Assembly "wrapping": a technique for anti-disassembly - Polymorphic and smaller versions of three shell-storm‘s x64 shellcodes, including the smallest execve /bin/sh - x64 Egg hunting in Linux systems - Twofish Crypter with DNS (CName) password retrieval, x64 shellcode decryption, and execution - JSgen.py - bind and reverse shell JS code generator for SSJI in Node.js with filter bypass encodings - Bypassing CSRF tokens with Python's CGIHTTPServer to exploit SQLi Back ...