Industrial Security.
Industrial Security.
Offensive Security & Explotation
Exploitation.
Exploitation.
Windows & Linux Kernel
Practical Pentesting
Practical Pentesting
Real world cybersecurity attack.
Tool Development
Tool Development
Design and develop own tool.
Shellcode.
Shellcode.
Write a shellcode step by step with NASM.
Reverse Engineering
Reverse Engineering
Reversing, debugging and protecting a software with cryptography.
[Reverse Engineering] How I Found a Suspicious Redistribution of My Project

[Reverse Engineering] How I Found a Suspicious Redistribution of My Project

READ MORE +
[Learning] How to Configure the Network of Your Virtual Machine using VMware Workstation

[Learning] How to Configure the Network of Your Virtual Machine using VMware Workstation

READ MORE +
[Troubleshooting] Installing VMware Tools on Windows XP and Windows 95 with VMware WorkStation 17

[Troubleshooting] Installing VMware Tools on Windows XP and Windows 95 with VMware WorkStation 17

READ MORE +
[Learning] How to Setup Your Experimental Environment for Malware Analysis

[Learning] How to Setup Your Experimental Environment for Malware Analysis

READ MORE +
[Studying] Analyzing BeastDoor

[Studying] Analyzing BeastDoor

READ MORE +
[Studying] Analyzing Netbus

[Studying] Analyzing Netbus

READ MORE +
[Studying] Inside Different Generations of RATs

[Studying] Inside Different Generations of RATs

READ MORE +
[Book] Java Code Audit (Fundamental)
BookBookNote

[Book] Java Code Audit (Fundamental)

READ MORE +
[Eden-RAT] How to Use Eden-RAT During the Early Stage of Penetration Testing

[Eden-RAT] How to Use Eden-RAT During the Early Stage of Penetration Testing

READ MORE +
[Tool] Eden-RATβ€”β€”A lightweight Remote Access Tool (RAT) designed for the initial stage of penetration testing

[Tool] Eden-RATβ€”β€”A lightweight Remote Access Tool (RAT) designed for the initial stage of penetration testing

READ MORE +