#exploitdevelopment search results

No results for "#exploitdevelopment"

Sharing is caring 🫶 Excellent write-up on MSRPC #exploitdevelopment. Clear breakdowns and great insights for anyone working in #WindowsInternals or offensive engineering. incendium.rocks/posts/Exploit-… From the #Hackcraft #RedTeaming team with love! #CyberSecurity #InfoSec #RedTeam


At #NullconBerlin2025, Emanuele Barbeno took us behind the scenes of Pwn2Own 2024, revealing how his team exploited a vulnerability in the Ubiquiti AI Bullet IP camera to achieve unauthenticated RCE. Watch Now: youtube.com/watch?v=l-7N6h… #Pwn2Own #ExploitDevelopment #Cybersecurity

nullcon's tweet card. #NullconBerlin2025 | DHCPwned: Owning Cameras One Lease at a Time by...

youtube.com

YouTube

#NullconBerlin2025 | DHCPwned: Owning Cameras One Lease at a Time by...


Implemented logic to modifying syscalls during process execution using a policy configuration file github.com/t1b4n3/pwntrace #reverseengineering #exploitdevelopment

t1b4n3's tweet image. Implemented  logic to  modifying syscalls during process execution using a policy configuration file

github.com/t1b4n3/pwntrace

#reverseengineering #exploitdevelopment
t1b4n3's tweet image. Implemented  logic to  modifying syscalls during process execution using a policy configuration file

github.com/t1b4n3/pwntrace

#reverseengineering #exploitdevelopment

I explain how Windows implements ASLR, how it affects reverse engineering and exploitation, and practical ways to analyze or bypass it when needed. reverselabs.dev/blog/aslr-addr… #WindowsSecurity #ReverseEngineering #ExploitDevelopment #MemoryProtection

carlosadrianosj's tweet image. I explain how Windows implements ASLR, how it affects reverse engineering and exploitation, and practical ways to analyze or bypass it when needed.
reverselabs.dev/blog/aslr-addr…

#WindowsSecurity #ReverseEngineering #ExploitDevelopment #MemoryProtection

Exploits aren't just code — they're proof of broken trust. Build them to understand, not to destroy. 💻⚠️ #ExploitDevelopment #EthicalHacking


Top Exploit Development Certs: OSED | GXPN | OSEE | CEDP Perfect for red teamers & researchers mastering exploit writing & vuln research. #ExploitDevelopment #CyberSecurity #InfoSec #OSED #OSEE #GXPN #azefoxinnovations #infosec #azefox #ethicalhacking

We_Azefox's tweet image. Top Exploit Development Certs:
OSED | GXPN | OSEE | CEDP
Perfect for red teamers & researchers mastering exploit writing & vuln research.

#ExploitDevelopment #CyberSecurity #InfoSec #OSED #OSEE #GXPN #azefoxinnovations #infosec #azefox #ethicalhacking

Final echoes of heap corruption exploitation attempts. The trajectory of defenses is heading in the right direction. #CyberSecurity #ExploitDevelopment #MemorySafety #HeapCorruption #InfoSec #VulnerabilityResearch #MTE

Another XPU/GPU exploit shows the kernel could be compromised even with 𝐌𝐓𝐄, by mapping a GPU address to any physical address. Attackers can overwrite kernel code/data & gain execution great blog by @benhawkes, loved rereading it one more time. googleprojectzero.blogspot.com/2020/09/attack…



OK, someone must've used #LLMs to either generate shell code or detect bad character's, when performing #exploitdevelopment.


From buffer overflows to ROP chains, exploit development & binary exploitation reveal how attackers break systems and how defenders can stay one step ahead. #ExploitDevelopment #BinaryExploitation #CyberSecurity #EthicalHacking #CyberDefense


📢 New Dates Announced! Corelan Exploit Development ➡️ Nov 18-21 & Dec 15-18 2025 | Bellevue, WA Red teamers, researchers, and analysts — this is for you. 🔗 ccsecuritytraining.com/registation #CyberTraining #ExploitDevelopment #Corelan


CVE-2023-26083 is a kernel address disclosure in Mali GPU drivers. Read how this Mali GPU bug impacts Pixel & other ARM64 devices - 8ksec.io/cve-2023-26083… #Android #CyberSecurity #ExploitDevelopment

8kSec's tweet image. CVE-2023-26083 is a kernel address disclosure in Mali GPU drivers.
Read how this Mali GPU bug impacts Pixel & other ARM64 devices - 8ksec.io/cve-2023-26083… 
#Android #CyberSecurity #ExploitDevelopment

VerSprite’s CREST-accredited pen testing goes beyond CVEs—simulating real-world adversary behavior across web, cloud, and infrastructure. Details: versprite.com/cybersecurity-… #CREST #RedTeamOps #ExploitDevelopment #PenTesting


Just finished part 2 of my #Chromium Bug Hunting Adventures series where we setup a working build for a software version affected by CVE-2024-5839! blog.r0kithax.com/posts/2025-06-… Stay tuned for my next post where I'll walk through the exploit! 🔥 #exploitdevelopment #BugBounty #pwn


Thinking about reproducing and doing a write-up for CVE-2024-5839 - a MiraclePtr bypass in #GoogleChrome that netted the security researcher $100,000. Thoughts? #exploitdevelopment #pwn #infosec #securityresearch


Made some progress today on #ExploitDevelopment. Vuln: SEH based Local Buffer Overflow. Vul app: Free MP3 CD Ripper (exploit-db.com/exploits/45403) Machine: Windows XP

Sakib_Janjua's tweet image. Made some progress today on #ExploitDevelopment.

Vuln: SEH based Local Buffer Overflow.
Vul app: Free MP3 CD Ripper (exploit-db.com/exploits/45403)
Machine: Windows XP

Implemented logic to modifying syscalls during process execution using a policy configuration file github.com/t1b4n3/pwntrace #reverseengineering #exploitdevelopment

t1b4n3's tweet image. Implemented  logic to  modifying syscalls during process execution using a policy configuration file

github.com/t1b4n3/pwntrace

#reverseengineering #exploitdevelopment
t1b4n3's tweet image. Implemented  logic to  modifying syscalls during process execution using a policy configuration file

github.com/t1b4n3/pwntrace

#reverseengineering #exploitdevelopment

freeFTPd 1.0.10 pwned!!! Another SEH stack-based buffer overflow. This was a fun exploit to develop, island hopping was a bit tricky, but worth the effort! #exploitdevelopment #osed

xCipher007's tweet image. freeFTPd 1.0.10 pwned!!! Another SEH stack-based buffer overflow. This was a fun exploit to develop, island hopping was a bit tricky, but worth the effort! #exploitdevelopment #osed
xCipher007's tweet image. freeFTPd 1.0.10 pwned!!! Another SEH stack-based buffer overflow. This was a fun exploit to develop, island hopping was a bit tricky, but worth the effort! #exploitdevelopment #osed

The virtual waiting room is now open! The live launch webinar of XDS starts soon 🙌 #exploitdevelopment #exploitdev #redteam #pentesting #vulnerability #research #infosec #ITsecurity

INEsecurity's tweet image. The virtual waiting room is now open! The live launch webinar of XDS starts soon 🙌 

#exploitdevelopment #exploitdev #redteam #pentesting #vulnerability #research #infosec #ITsecurity

Attending fulll power packed session on Exploit development 101 by @malav_vyas1 @NullAhm @null0x00 #exploitdevelopment #nullahm #exploitdevelopment

jay_yaml's tweet image. Attending fulll power packed session on Exploit development 101 by @malav_vyas1  
@NullAhm 
@null0x00 
#exploitdevelopment
#nullahm
#exploitdevelopment

I explain how Windows implements ASLR, how it affects reverse engineering and exploitation, and practical ways to analyze or bypass it when needed. reverselabs.dev/blog/aslr-addr… #WindowsSecurity #ReverseEngineering #ExploitDevelopment #MemoryProtection

carlosadrianosj's tweet image. I explain how Windows implements ASLR, how it affects reverse engineering and exploitation, and practical ways to analyze or bypass it when needed.
reverselabs.dev/blog/aslr-addr…

#WindowsSecurity #ReverseEngineering #ExploitDevelopment #MemoryProtection

Exploit Development, Part 3: Fuzzing with Spike to Find Vulnerabilities #fuzzing #spike #exploitdevelopment #cybersecurity #cyberwarrior bit.ly/2tt1syJ

three_cube's tweet image. Exploit Development, Part 3: Fuzzing with Spike to Find Vulnerabilities #fuzzing #spike #exploitdevelopment #cybersecurity #cyberwarrior 

bit.ly/2tt1syJ

Kick your #cybersecurity career into high gear with our newest training course, Exploit Development Student! 💪 Join us for the live launch webinar on September 17th: bit.ly/2lzXuow #InfoSec #ExploitDevelopment

INEsecurity's tweet image. Kick your #cybersecurity career into high gear with our newest training course, Exploit Development Student! 💪 Join us for the live launch webinar on September 17th: bit.ly/2lzXuow #InfoSec #ExploitDevelopment

Exploit Development, Part 3: Finding Security Vulnerabilities Using the Spike Fuzzer #fuzz #exploitdevelopment #spike #cybersecurity #cyberwarrior hackers-arise.com/post/2017/06/2…

three_cube's tweet image. Exploit Development, Part 3: Finding Security Vulnerabilities Using the Spike Fuzzer #fuzz #exploitdevelopment #spike #cybersecurity #cyberwarrior

hackers-arise.com/post/2017/06/2…

Are you attending our #exploitdevelopment webinar for a chance to #win either a FREE XDS Elite Edition or XDS Full Edition? 🎁

INEsecurity's tweet image. Are you attending our #exploitdevelopment webinar for a chance to #win either a FREE XDS Elite Edition or XDS Full Edition? 🎁

VulnApp1 Bo obtained in #OSCP lab. A mix of visual inspection method + @0xTib3rius tricks went a long way. Here it is, finally! #hacking #exploitdevelopment

mattiacampagnan's tweet image. VulnApp1 Bo obtained in #OSCP lab. A mix of visual inspection method +  @0xTib3rius tricks went a long way. Here it is, finally!
#hacking #exploitdevelopment

مجموعة مقالات بالعربية كتبتها منذ فترة لشرح بعض المواضيع المتعلقة بـ #ExploitDevelopment -Intro to x86 Shellcoding -Writing Linux Shellcode -Writing Windows Shellcode -SEH Exploits -Egg Hunters nakerah.net/community/reso… #exploitDev #cybersecurity #redteam #أمن_المعلومات

0xMuhammad's tweet image. مجموعة مقالات بالعربية كتبتها منذ فترة لشرح بعض المواضيع المتعلقة بـ
#ExploitDevelopment

-Intro to x86 Shellcoding
-Writing Linux Shellcode
-Writing Windows Shellcode
-SEH Exploits
-Egg Hunters

nakerah.net/community/reso…

#exploitDev #cybersecurity #redteam #أمن_المعلومات

CVE-2023-26083 is a kernel address disclosure in Mali GPU drivers. Read how this Mali GPU bug impacts Pixel & other ARM64 devices - 8ksec.io/cve-2023-26083… #Android #CyberSecurity #ExploitDevelopment

8kSec's tweet image. CVE-2023-26083 is a kernel address disclosure in Mali GPU drivers.
Read how this Mali GPU bug impacts Pixel & other ARM64 devices - 8ksec.io/cve-2023-26083… 
#Android #CyberSecurity #ExploitDevelopment

Loading...

Something went wrong.


Something went wrong.


United States Trends