Articles

Top Resources

  1. 00 - x86 Shellcoding | Introduction
    Quick tutorial on how to write shellcode for exploits - by Eng.Nour
    Updated: Nov 18, 2017
  2. 01 - x86 Shellcoding | Linux Shellcode Part 1
    How to write linux shellcode - by Eng.Nour
    Updated: Nov 27, 2017
  3. 00 - Defensive Security | Introduction
    Defensive Security Introduction - by Eng.Nour
    Updated: Sep 5, 2017
  4. 05 - Egg Hunters
    Locating Shellcode in Memory - by Eng.Nour
    Updated: Jan 21, 2018
  5. 03 - Defensive Security | Email Security Part 3
    Practical guide to enhanicng Email Security - by Eng.Nour
    Updated: Sep 9, 2017
  1. Resources are being shown from all child categories.
  2. Eng.Nour
    4.66667/5, 12 ratings
    Updated:
    Sep 5, 2017
  3. Limbo
    5/5, 5 ratings
    Updated:
    Aug 6, 2019
  4. Eng.Nour

    00 - x86 Shellcoding | Introduction

    Quick tutorial on how to write shellcode for exploits
    5/5, 23 ratings
    Updated:
    Nov 18, 2017
  5. Eng.Nour

    01 - Defensive Security | Email Security Part 1

    Practical guide to enhanicng Email Security
    4.54545/5, 11 ratings
    Updated:
    Sep 7, 2017
  6. Limbo
    5/5, 1 rating
    Updated:
    Aug 31, 2019
  7. Eng.Nour
    4.93333/5, 15 ratings
    Updated:
    Nov 27, 2017
  8. Eng.Nour
    5/5, 3 ratings
    Updated:
    Nov 30, 2017
  9. Eng.Nour

    02- Defensive Security | Email Security Part 2

    Practical guide to enhanicng Email Security
    4.8/5, 5 ratings
    Updated:
    Sep 8, 2017
  10. Eng.Nour

    03 - Defensive Security | Email Security Part 3

    Practical guide to enhanicng Email Security
    5/5, 8 ratings
    Updated:
    Sep 9, 2017
  11. Eng.Nour

    04 - SEH Based Exploits

    Exploitation Using Exception Handlers
    5/5, 2 ratings
    Updated:
    Jan 8, 2018
  12. Eng.Nour
    5/5, 8 ratings
    Updated:
    Jan 21, 2018
  13. Younes
    5/5, 6 ratings
    Updated:
    Dec 31, 2017