Performing NTLM relay attacks using SMB and LDAP.
Bypassing NX on 64-bit Linux.
Bypassing DEP & ASLR using pointer leakage and return orientated programming.
A quick tutorial on exploiting format string vulnerabilities to read and write memory.
A guide on configuring Kali so all network traffic is routed over an OpenVPN connection.