top of page
6 min read
Exploit Development, Part 3: Finding Vulnerabilities by Fuzzing with Spike
Often, as part of the exploit development process, we will want to test an application for vulnerabilities, especially buffer overflows....
8,205 views
3 min read
Metasploit Basics, Part 8: Exploitation with EternalBlue
Welcome back, my aspiring hackers! The Metasploit framework has become a multipurpose pentesting tool--but at its heart--it's an...
34,035 views
6 min read
Exploit Development, Part 2: Writing a Simple Buffer Overflow
I. Introduction In the previous lesson in this module, we explored the basics of buffer overflows. We defined buffer overflows and looked...
2,972 views
4 min read
Browser Exploitation Framework (BeEF), Part 1
There are multitude of ways to exploit a target's system. Newbie hackers often focus on the operating system or applications, but few...
8,426 views
4 min read
How to Find the Right Exploit for the Job
This tutorial is designed to help you find and use exploits that will work against known vulnerabilities. As you already know, there is...
1,620 views
bottom of page