64-Bit Return-to-libc Attacks

Bypassing NX on 64-bit Linux.

Bypassing Linux NX & ASLR

Bypassing NX & ASLR using pointer leakage and ROP.

Format String Exploitation

A quick tutorial on exploiting format string vulnerabilities to read and write memory.

PowerShell Constrained Mode

A guide to enabling PowerShell constrained mode.

Kali OpenVPN Killswitch

Ensuring all network traffic is routed over an OpenVPN connection.

Pentest One Liners

A list of one line commands for Windows to download and execute payloads.

Credential Interception Using Malicious SMB Shares

How to intercept NTLM-SSP hashed credentials for offline cracking.

Casino Royale CTF

A walkthrough for VulnHub’s Casino Royale CTF.

Software Restriction Policies

Configuring Software Restriction Policies (SRP) in Windows 10.

GoldenEye CTF

A writeup of the VulnHub GoldenEye capture the flag (CTF) challenge.

Extracting Windows Credentials Using Native Tools

How to extract credentials from Windows systems using built in commands.

Kerberoasting

Kerbroasting to extract service account credentials.