Using relative JMP instructions to escape small buffers.
Blocking outbound docker traffic using an IPTables firewall.
Performing NTLM relay attacks using SMB and LDAP.
Bypassing NX on 64-bit Linux.
Bypassing DEP & ASLR using pointer leakage and return orientated programming.
A quick tutorial on exploiting format string vulnerabilities to read and write memory.
A guide to enabling PowerShell constrained mode.
A guide on configuring Kali so all network traffic is routed over an OpenVPN connection.
A list of one line commands for Windows to download and execute payloads.