#exploitdev 검색 결과

This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation exploitation.ashemery.com

binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com
binaryz0ne's tweet image. This should be the final set of labs published publicly. That's all folks for now... #RE #Offsec #ExploitDev #SoftwareExploitation

exploitation.ashemery.com

I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD #CyberSecurity #exploitdev

emiratic0der's tweet image. I’m happy to announce that I passed OSED from @offsectraining 😍😍 I just got the email and man IT FELT SO GOOD 
#CyberSecurity #exploitdev

Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed
xCipher007's tweet image. Pwned Minishare 1.4.1 via Vanilla Stack-based buffer overflow! #exploitdev #osed

Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️ #CyberSecurity #ExploitDev #ReverseEngineering

Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering
Paul__ige's tweet image. Bypassing PIE with partial overwrite? 🔥 Instead of guessing full addresses, just overwrite specific bytes to align with predictable offsets. Precision > brute force. A reminder that security evolves, and so must we. 🛡️
#CyberSecurity #ExploitDev #ReverseEngineering

🚨 Released a full SEH exploit chain for DeepFreeze 8! With custom shellcode and ROP chain. Software was fully reversed, and an SEH vuln discovered studying for the #OSED 💪Blog write-up coming soon.🔍github.com/snowcra5h/Faro… #CyberSecurity #ExploitDev


If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circumvent kernel address leak restrictions and retrieve the kernel base address :p xacone.github.io/kaslr_leak_24h… #exploitdev #driverexploitation


CVE-2025-52915 assigned - my first vulnerability!🥳 A classic BYOVD case: kernel driver with unrestricted process termination. Vendor coordination turned out more challenging than the exploit itself. Technical write-up: blacksnufkin.github.io/posts/BYOVD-CV… #ExploitDev #CVE #BYOVD #RedTeam


Important note to those new to this account. The course below is completely FREE. I know someone (maybe more) has ripped the videos & probably now the labs & is selling them on @udemy. Please do not pay for this course, it is FREE! #ExploitDev #Offsec exploitation.ashemery.com


⚠️ Afraid of public classes? 🔒 Corelan Academy = private, intense, small-group exploit dev training 2–8 ppl • one-on-one access • flexible timing • competitive pricing • Stack & Heap DM or reply interested #corelan #exploitdev #training #heap #stack #corelanacademy


⚠️ Afraid of public classes? 🔒 Corelan Academy = private, intense, small-group exploit dev training 2–8 ppl • one-on-one access • flexible timing • competitive pricing • Stack & Heap DM or reply interested #corelan #exploitdev #training #heap #stack #corelanacademy


Next goal, OSED certification. #offsec #exploitdev


ویدیوهای کنفرانس DistrictCon 2025 در #یوتیوب منتشر شد. کنفرانس @DistrictCon یک کنفرانس #امنیت_سایبری جامعه محور هستش که تمرکز اصلیش از #ExploitDev و #REV گرفته تا سیاست امنیت اطلاعات و ژئوپلیتیک هستش. فضاش یکمی دارکه ! youtube.com/@districtcon #کنفرانس #DistrictCon


موضوع برنامه ی Off By One Security این هفته "A Practical Look at Windows Kernel Mode Shadow Stacks and the Secure Kernel!" هستش. این برنامه ساعت 23 به وقت ایران پخش میشه. اگه فرصت نکردید، برنامه ضبط میشه و بعدا هم از همون لینکها قابل دسترسه. #اکسپلویت #ExploitDev #windows

Join me on Friday, February 14th on the @offby1security stream with the amazing @33y0re (Connor McGarr) for a look at Windows Kernel Mode Shadow Stacks and the Secure Kernel! youtube.com/watch?v=T7qxs-…

Steph3nSims's tweet image. Join me on Friday, February 14th on the @offby1security stream with the amazing @33y0re (Connor McGarr) for a look at Windows Kernel Mode Shadow Stacks and the Secure Kernel!

youtube.com/watch?v=T7qxs-…


𝑪𝒊𝒂𝒐 𝑰𝒕𝒂𝒍𝒚, 𝑪𝒊𝒂𝒐 𝑹𝒐𝒎𝒂! 𝑹𝒆𝒂𝒅𝒚 𝒇𝒐𝒓 𝑪𝒐𝒓𝒆𝒍𝒂𝒏? Sign up for our Expert-level stack class: bit.ly/corelan-traini… #corelan #stack #exploitdev #windows11


💻 Go-exploit A Go-based exploit framework for creating compact, portable, and uniform exploits, with minimal dependencies and cross-compilation capabilities By VulnCheck's @Junior_Baines et al #infosec #exploitdev github.com/vulncheck-oss/…


"#exploitdev"에 대한 결과가 없습니다
"#exploitdev"에 대한 결과가 없습니다
Loading...

Something went wrong.


Something went wrong.


United States Trends