This article delves into our comprehensive training program designed to teach you the intricacies of exploiting heap vulnerabilities in glibc.
Originally taught at prestigious conferences like DEFCON and CanSecWest, this program offers a mix of free videos, slides, and hands-on exercises to enhance your learning.
Whether you are a beginner looking to understand the basics of malloc and heap vulnerabilities or an experienced hacker seeking advanced techniques, our modular course structure is tailored to optimize your time and deepen your expertise in this complex subject matter.
Join us to master the art of heap exploitation and fortify your cybersecurity toolkit.
There is a lot of content here. So, there are two ways to go through it:
Whatever you do, do NOT skip the first two modules. These are the most important concepts in the entire course.
For more information click here.
Your malware's favorite sandbox - where red teamers come to bury their payloads. A sandbox…
Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new…
BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this…
In 2025 I wanted to try something new. In addition to a traditional 100 days…
presenterm lets you create presentations in markdown format and run them from your terminal, with…
Jailbreak is an attack that prompts a language model to give actionable responses to harmful…