Latest Posts
Java deserialization vulnerabilities have become easy to exploit and allow an attacker to remotely compromise a server. How prevalent are these vulnerabilities in open-source projects? This post explores how often Java projects use serialization and walks through exploiting a 0-day vulnerability in Gradle.
continue reading...
Scala Streams are similar to Lists but evalute their elements lazily. This small detail makes the world of difference. This post explores Streams and how they can encapsulate infinate sets.
continue reading...
Learn to develop a stack buffer overflow exploit from scratch. This is an intermediate difficulty walkthrough as ASLR and NX mitigations are enabled. The exploit is developed as a Metasploit module.
continue reading...