DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Internet Steelcon 2014 - Process Injection with Python

Python: Process Injection for Everyone! Darren Martyn Xiphos Research [email protected] whoami • Darren Martyn / infodox • Penetration Tester & Researcher…

Technology 2011-03 Developing Windows Exploits

1. RealWindowsExploitsAllen Harper 1 2. ProSSHD VulnerabilityBinary can be found at: http://www.exploit-db.com/application/11618 STILL NOT FIXED…0-days still work… 2…

Education Exploit Research and Development Megaprimer: mona.py, Exploit Writer's Swiss Army Knife

1. EXPLOIT RESEARCH EXPLOIT DEVELOPMENT WITH MONA Kerala Cyber Force www.keralacyberforce.in Ajin Abraham @ajinabraham 2. @ajinabraham WHAT IS ? • Mona is a plugin for…

Technology Reversing & Malware Analysis Training Part 10 - Exploit Development Basics

1. www.SecurityXploded.com 2. DisclaimerThe Content, Demonstration, Source Code and Programs presented hereis "AS IS" without any warranty or conditions of any…

Technology Overview of python misec - 2-2012

1.Overview of PythonFlying made simple without the Nyquil hangover2. Agenda• About me• History of Python• About Python• Python’s uses• Python basics (Python 101)•…

Technology Open Source Cyber Weaponry

1.Open Source Cyber Weaponry 2. introduction Chief Security Founder & ChiefOfficerArchitect 3. backgroundPerspective • 15 years of software development • 12 years…

Technology Windows meterpreterless post exploitation

1. “Metasploit”ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of Metasploit Framework…

Technology White Lightning Sept 2014

1. Exploiting Browsers Like A Boss withWhite Lightning!Whoa, this isn't wood shop class? 2. Exploitation- (Pen)TestingDefense- Threat IntelAbout Bryce2Recipe Makes 1…

Technology Shmoocon 2015 - httpscreenshot

httpscreenshot A Tool for Both Teams Outline ⢠Who we are ⢠The problem ⢠Our solution ⢠Demo ⢠How weâve used it ⢠Q&A Who We Are â Steve Breen ⢅

Documents 01 Intro

Introduction CIS 4930 / CIS 5930 Offensive Security Prof Xiuwen Liu W. Owen Redwood This class ● Structured as a hands-on survey of topics ○ Topics hand picked from a…