Blog
-
Here Be Dragons: Reverse Engineering with Ghidra - Part 1 [Data, Functions & Scripts]
Welcome to the second part in a tutorial series on reverse engineering Windows binaries with Ghidra! In this post, we’ll be building on the concepts we learned in Part 0 and introduce some new topics ...
-
Here Be Dragons: Reverse Engineering with Ghidra - Part 0 [Main Windows & CrackMe]
Welcome to the first part in a tutorial series on reverse engineering with Ghidra! This series will be focused on using the newly released tool from the NSA ...
-
Zero Day Zen Garden: Windows Exploit Development - Part 5 [Return Oriented Programming Chains]
Hello again! Welcome to another post on Windows exploit development. Today we’re going to be discussing a technique called Return Oriented Programming (ROP) ...
-
Zero Day Zen Garden: Windows Exploit Development - Part 4 [Overwriting SEH with Buffer Overflows]
Hello! In this post we’re looking at SEH overwrite exploits and our first Remote Code Execution. ...
-
Zero Day Zen Garden: Windows Exploit Development - Part 3 [Egghunter to Locate Shellcode]
Hey there! Today, we’re going to be using an egghunter to find shellcode on the stack. ...
-
Zero Day Zen Garden: Windows Exploit Development - Part 2 [JMP to Locate Shellcode]
Hello! Welcome to Part 2, today we’ll be looking at a stack buffer over flow that uses a short jump ...
-
Zero Day Zen Garden: Windows Exploit Development - Part 1 [Stack Buffer Overflow Intro]
In Part 1 of this series, we’ll be exploiting a stack buffer overflow using a Saved Return Pointer ...
-
Zero Day Zen Garden: Windows Exploit Development - Part 0 [Dev Setup & Advice]
Welcome to the first post in a series of tutorials on exploit development and vulnerability ...
-
Shuriken XSS tool released
Yesterday, I released version 1.0.0 of the Shuriken XSS command line tool on GitHub. It’s the first ...
-
Hello, world
Hi there! I’m Steven and I founded Shogun Lab to separate my work on penetration testing ...
Subscribe via RSS