The Void 🌌

      • 📄 Backdooring Portable Executables (PE)
      • 📄 Conquering Goliath as a CCDC Blue Teamer
      • 📄 Downsizing My Home Lab
      • 📄 EggHunter x86_64
      • 📄 Exploit Exercise Protostar Stack Series
      • 📄 Hardware Hacking CTF - HackIN
      • 📄 How to Setup Logitech MX Master Mouse with Linux
      • 📄 HTB Dante Pro Lab and THM Throwback AD Lab
      • 📄 My HomeLab
      • 📄 NCL Exploitation Root Cause Write Up
      • 📄 No More Network Bottlenecks
      • 📄 Pivoting with Chisel
      • 📄 Processing Ideas and Taking Smart Notes
      • 📄 Productive Applications and Tools
      • 📄 Proxmox VM Creation Script for Quick Pentest Lab
      • 📄 Refined Home Lab Network
      • 📄 Unmasking Secrets - Deciphering Encrypted Passwords through Reverse Engineering
      • 📄 Working on Remote Projects with Visual Studio Code
      • 📄 API Hashing
      • 📄 API Hooking
      • 📄 Backdooring Portable Executable
      • 📄 Beacon Object Files
      • 📄 Certification Review and Prep
      • 📄 CIA DOs and DONTs
      • 📄 Clearing Command History
      • 📄 Code Signing Certificate Spoofing
      • 📄 Coerce Forced Authentication
      • 📄 COM Hijacking
      • 📄 Command and Control (C2) Infrastructure Design
      • 📄 Command Line Spoofing
      • 📄 Common Password List
      • 📄 Create Account for Persistence
      • 📄 Creating a Phishing Pre-Text
      • 📄 Cross Site Request Forgery (CSRF)
      • 📄 Custom DMA Firmware
      • 📄 Cyber Crime Forums
      • 📄 Dark Net Markets
      • 📄 DHCPv6 Spoofing (IPv6)
      • 📄 Disable or Modify Firewall, EDR, or AV
      • 📄 DLL Side Loading
      • 📄 DNS Records
      • 📄 DOM XSS
      • 📄 Domain Categorization Review
      • 📄 Domain Information
      • 📄 Dumping Credentials
      • 📄 Dynamic Analysis
      • 📄 Elevators and Keys
      • 📄 Email Phishing
      • 📄 Event Tracing for Windows (ETW)
      • 📄 Exploit Development Resources
      • 📄 External Password Spraying
      • 📄 FCC ID
      • 📄 General Hacking Resources
      • 📄 Getting CVE's
      • 📄 Hacker Blogs
      • 📄 Hiding Socket Connections
      • 📄 How to Install Ghidra on Ubuntu 19.10
      • 📄 HTML Smuggling
      • 📄 Identify the Domain
      • 📄 Identifying Email Accounts
      • 📄 Information Security Salaries
      • 📄 Internal Password Spraying
      • 📄 IO Request Packet (IRP)
      • 📄 IP Address Search Engines
      • 📄 Kernel Patch Protection (KPP)
      • 📄 Legacy Instructions
      • 📄 Linux Backdoor Techniques
      • 📄 LLMNR NBT-NS Poisoning
      • 📄 LMK Modification
      • 📄 Loading and Running a Kernel Driver
      • 📄 Local Administrator Password Solution (LAPS)
      • 📄 Local File Inclusion
      • 📄 Malware Detection Testing
      • 📄 Memory Tags
      • 📄 Microsoft Excel for Persistence
      • 📄 Microsoft Office Templates for Persistence
      • 📄 Modifying PAM to reveal Clear-text Credentials
      • 📄 Module Stomping
      • 📄 Network Service Discovery
      • 📄 Network Sniffing
      • 📄 NIC Teaming
      • 📄 Non-Staged Payload
      • 📄 NTLM Relay
      • 📄 Office
      • 📄 Online Data Conversions
      • 📄 Online Password Cracking
      • 📄 Open Source Intelligence (OSINT)
      • 📄 Packer
      • 📄 Password Spraying
      • 📄 Payload Guardrails
      • 📄 Payload Staging
      • 📄 Payload Testing
      • 📄 Phishing Frameworks
      • 📄 Phishing Links
      • 📄 Physical Bypass Tools
      • 📄 PPID Spoofing
      • 📄 Print Monitors
      • 📄 Printing Kernel Debug Messages
      • 📄 Process Hollowing
      • 📄 Process Injection
      • 📄 Redirectors
      • 📄 Reflected XSS
      • 📄 Registry Keys for Persistence
      • 📄 Remote Code Execution
      • 📄 Remote Direct Memory Access (RDMA)
      • 📄 Reverse Engineering Books
      • 📄 Rust Game Server
      • 📄 Security Support Providers (SSPs) and Authentication Packages (APs)
      • 📄 SeImpersonatePrivilege
      • 📄 SetUID and SetGID
      • 📄 Shellcode Loader
      • 📄 Shellcode Loaders
      • 📄 Shells Beyond the Firewall
      • 📄 SMB Relay
      • 📄 Spoof File Extentions (RTLO)
      • 📄 SSH Authorized Keys and TrustedUserCAKeys
      • 📄 SSH AuthorizedKeysCommand and AuthorizedKeysCommandUser
      • 📄 Staged Payload
      • 📄 Stageless Payload
      • 📄 Static Analysis
      • 📄 Steal or Forge Authentication Certificates (AD CS)
      • 📄 Sticky Keys
      • 📄 Stored XSS
      • 📄 Suicide Hotlines
      • 📄 System Network Configuration Discovery
      • 📄 System Services
      • 📄 Test Signing
      • 📄 Time Stomping
      • 📄 Top of Google Search
      • 📄 Typo Squatting
      • 📄 Understanding PCIe Windows
      • 📄 Unsecured Credentials
      • 📄 Vishing
      • 📄 Visual Basic
      • 📄 Webhooks
      • 📄 Website Cloning
      • 📄 Wifi Adapters for Pentesting
      • 📄 Windows Kernel Exploits
      • 📄 Windows Undocumented Structures
      • 📄 Development
      • 📄 Lifestyle
      • 📄 Offensive Security
      • 📄 Reverse Engineering
      • 📄 Active Directory
      • 📄 Career
      • 📄 Command and Control
      • 📄 Credential Access
      • 📄 Cryptography
      • 📄 CTF
      • 📄 Dark Net
      • 📄 Debugging
      • 📄 Defense Evasion
      • 📄 Exploit Development
      • 📄 Game Hacking
      • 📄 Hardware
      • 📄 Homelab
      • 📄 HowTo
      • 📄 Information Gathering
      • 📄 Infrastructure
      • 📄 Initial Access
      • 📄 Kiosk Break Out
      • 📄 Lateral Movement
      • 📄 Learning Material
      • 📄 Malware
      • 📄 Mental Health
      • 📄 Persistence
      • 📄 Physical
      • 📄 Privacy
      • 📄 Privilege Escalation
      • 📄 Productivity
      • 📄 Social Engineering
      • 📄 Software Development
      • 📄 Web Application
      • 📄 Windows Internals
      • 📄 Windows Kernel
    Home

    ❯

    02 Secondary Categories

    ❯

    02-Exploit Development

    02-Exploit Development

    Sep 21, 20241 min read

    01-Development 01-Offensive Security 01-Reverse Engineering


    Graph View

    Backlinks

    • Hacker Blogs
    • Backdooring Portable Executables (PE)
    • EggHunter x86_64
    • Exploit Exercise Protostar Stack Series

    Recent Blog Posts

    • No More Network Bottlenecks

      Sep 24, 2024

    • Unmasking Secrets - Deciphering Encrypted Passwords through Reverse Engineering

      Nov 20, 2023

    • Conquering Goliath as a CCDC Blue Teamer

      Feb 22, 2023

        • 📄 Backdooring Portable Executables (PE)
        • 📄 Conquering Goliath as a CCDC Blue Teamer
        • 📄 Downsizing My Home Lab
        • 📄 EggHunter x86_64
        • 📄 Exploit Exercise Protostar Stack Series
        • 📄 Hardware Hacking CTF - HackIN
        • 📄 How to Setup Logitech MX Master Mouse with Linux
        • 📄 HTB Dante Pro Lab and THM Throwback AD Lab
        • 📄 My HomeLab
        • 📄 NCL Exploitation Root Cause Write Up
        • 📄 No More Network Bottlenecks
        • 📄 Pivoting with Chisel
        • 📄 Processing Ideas and Taking Smart Notes
        • 📄 Productive Applications and Tools
        • 📄 Proxmox VM Creation Script for Quick Pentest Lab
        • 📄 Refined Home Lab Network
        • 📄 Unmasking Secrets - Deciphering Encrypted Passwords through Reverse Engineering
        • 📄 Working on Remote Projects with Visual Studio Code
        • 📄 API Hashing
        • 📄 API Hooking
        • 📄 Backdooring Portable Executable
        • 📄 Beacon Object Files
        • 📄 Certification Review and Prep
        • 📄 CIA DOs and DONTs
        • 📄 Clearing Command History
        • 📄 Code Signing Certificate Spoofing
        • 📄 Coerce Forced Authentication
        • 📄 COM Hijacking
        • 📄 Command and Control (C2) Infrastructure Design
        • 📄 Command Line Spoofing
        • 📄 Common Password List
        • 📄 Create Account for Persistence
        • 📄 Creating a Phishing Pre-Text
        • 📄 Cross Site Request Forgery (CSRF)
        • 📄 Custom DMA Firmware
        • 📄 Cyber Crime Forums
        • 📄 Dark Net Markets
        • 📄 DHCPv6 Spoofing (IPv6)
        • 📄 Disable or Modify Firewall, EDR, or AV
        • 📄 DLL Side Loading
        • 📄 DNS Records
        • 📄 DOM XSS
        • 📄 Domain Categorization Review
        • 📄 Domain Information
        • 📄 Dumping Credentials
        • 📄 Dynamic Analysis
        • 📄 Elevators and Keys
        • 📄 Email Phishing
        • 📄 Event Tracing for Windows (ETW)
        • 📄 Exploit Development Resources
        • 📄 External Password Spraying
        • 📄 FCC ID
        • 📄 General Hacking Resources
        • 📄 Getting CVE's
        • 📄 Hacker Blogs
        • 📄 Hiding Socket Connections
        • 📄 How to Install Ghidra on Ubuntu 19.10
        • 📄 HTML Smuggling
        • 📄 Identify the Domain
        • 📄 Identifying Email Accounts
        • 📄 Information Security Salaries
        • 📄 Internal Password Spraying
        • 📄 IO Request Packet (IRP)
        • 📄 IP Address Search Engines
        • 📄 Kernel Patch Protection (KPP)
        • 📄 Legacy Instructions
        • 📄 Linux Backdoor Techniques
        • 📄 LLMNR NBT-NS Poisoning
        • 📄 LMK Modification
        • 📄 Loading and Running a Kernel Driver
        • 📄 Local Administrator Password Solution (LAPS)
        • 📄 Local File Inclusion
        • 📄 Malware Detection Testing
        • 📄 Memory Tags
        • 📄 Microsoft Excel for Persistence
        • 📄 Microsoft Office Templates for Persistence
        • 📄 Modifying PAM to reveal Clear-text Credentials
        • 📄 Module Stomping
        • 📄 Network Service Discovery
        • 📄 Network Sniffing
        • 📄 NIC Teaming
        • 📄 Non-Staged Payload
        • 📄 NTLM Relay
        • 📄 Office
        • 📄 Online Data Conversions
        • 📄 Online Password Cracking
        • 📄 Open Source Intelligence (OSINT)
        • 📄 Packer
        • 📄 Password Spraying
        • 📄 Payload Guardrails
        • 📄 Payload Staging
        • 📄 Payload Testing
        • 📄 Phishing Frameworks
        • 📄 Phishing Links
        • 📄 Physical Bypass Tools
        • 📄 PPID Spoofing
        • 📄 Print Monitors
        • 📄 Printing Kernel Debug Messages
        • 📄 Process Hollowing
        • 📄 Process Injection
        • 📄 Redirectors
        • 📄 Reflected XSS
        • 📄 Registry Keys for Persistence
        • 📄 Remote Code Execution
        • 📄 Remote Direct Memory Access (RDMA)
        • 📄 Reverse Engineering Books
        • 📄 Rust Game Server
        • 📄 Security Support Providers (SSPs) and Authentication Packages (APs)
        • 📄 SeImpersonatePrivilege
        • 📄 SetUID and SetGID
        • 📄 Shellcode Loader
        • 📄 Shellcode Loaders
        • 📄 Shells Beyond the Firewall
        • 📄 SMB Relay
        • 📄 Spoof File Extentions (RTLO)
        • 📄 SSH Authorized Keys and TrustedUserCAKeys
        • 📄 SSH AuthorizedKeysCommand and AuthorizedKeysCommandUser
        • 📄 Staged Payload
        • 📄 Stageless Payload
        • 📄 Static Analysis
        • 📄 Steal or Forge Authentication Certificates (AD CS)
        • 📄 Sticky Keys
        • 📄 Stored XSS
        • 📄 Suicide Hotlines
        • 📄 System Network Configuration Discovery
        • 📄 System Services
        • 📄 Test Signing
        • 📄 Time Stomping
        • 📄 Top of Google Search
        • 📄 Typo Squatting
        • 📄 Understanding PCIe Windows
        • 📄 Unsecured Credentials
        • 📄 Vishing
        • 📄 Visual Basic
        • 📄 Webhooks
        • 📄 Website Cloning
        • 📄 Wifi Adapters for Pentesting
        • 📄 Windows Kernel Exploits
        • 📄 Windows Undocumented Structures
        • 📄 Development
        • 📄 Lifestyle
        • 📄 Offensive Security
        • 📄 Reverse Engineering
        • 📄 Active Directory
        • 📄 Career
        • 📄 Command and Control
        • 📄 Credential Access
        • 📄 Cryptography
        • 📄 CTF
        • 📄 Dark Net
        • 📄 Debugging
        • 📄 Defense Evasion
        • 📄 Exploit Development
        • 📄 Game Hacking
        • 📄 Hardware
        • 📄 Homelab
        • 📄 HowTo
        • 📄 Information Gathering
        • 📄 Infrastructure
        • 📄 Initial Access
        • 📄 Kiosk Break Out
        • 📄 Lateral Movement
        • 📄 Learning Material
        • 📄 Malware
        • 📄 Mental Health
        • 📄 Persistence
        • 📄 Physical
        • 📄 Privacy
        • 📄 Privilege Escalation
        • 📄 Productivity
        • 📄 Social Engineering
        • 📄 Software Development
        • 📄 Web Application
        • 📄 Windows Internals
        • 📄 Windows Kernel

      Recent Blog Posts

      • No More Network Bottlenecks

        Sep 24, 2024

      • Unmasking Secrets - Deciphering Encrypted Passwords through Reverse Engineering

        Nov 20, 2023

      • Conquering Goliath as a CCDC Blue Teamer

        Feb 22, 2023