Bypassing NX on 64-bit Linux.
Bypassing DEP & ASLR using pointer leakage and return orientated programming.
A quick tutorial on exploiting format string vulnerabilities to read and write memory.
A guide to enabling PowerShell constrained mode.
A guide on configuring Kali so all network traffic is routed over an OpenVPN connection.