corelan-training.com - ..:: Corelan Cybersecurity Research ::..Corelan Cybersecurity Research

Description: Corelan Cyber Security Research Exploit Development Tutorials Training Infosec Training corelanc0d3r

cybersecurity (2422) tutorials (1699) information security (676) infosec (293) exploitation (190) buffer (98) heap (14) corelan team (3) peter van eeckhoutte (3) research overflow (3)

Example domain paragraphs

Introduction Ok, I have a confession to make, I have always been somewhat intrigued by egghunters. That doesn’t mean that I like to use (or abuse) an egghunter just because I fancy what it does. In fact, I believe it’s a good practise to try to avoid egghunters if you can, as they tend to […]

Introduction Hi all, Over the course of the past few weeks ago, I received a number of “emergency” calls from some relatives, asking me to look at their computer because “things were broken”, “things looked different” and “I think my computer got hacked”.  I quickly realized that their computers got upgraded to Windows 10. We […]

Introduction 3 weeks ago, I posted a rant about my frustration/concern related with crypto tools, more specifically the lack of tools to implement crypto-based protection for files on OSX, in a point-&-click user-friendly way.  I listed my personal functional and technical criteria for such tools and came to the conclusion that the industry seem to […]

Links to corelan-training.com (4)