Here's a post dedicated to the new form of ransomware, Babuk Locker. I mention its encryption...
In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD
In this article we will defeat some protections using several techniques for exploting HackSys...
This article will be the first approach to start exploting HackSys Extremely Vulnerable Driver...
This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers
This post will show how to create a complete, functional exploit creating a complex shellcode using ROP
This post will show how bypass the Data Execution Prevention security mechanism using...
This post will show how the Data Execution Prevention (DEP) security mechanism works and what...
This post will describe the journey that I took to earn the OSCE certification.
This post will show how to build our version of an exploit for NetScanner 4.0.0.0, which was...
This post will show how use reverse engineering techniques and tools to find vulnerabilities on...
This post will show how to exploit the Vulnserver KSTET command loading the payload from an...
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.