Learning C – Part 3 Stacks, Heaps, and Pointers

The terms Stack, Pointers, and Memory are some of the most difficult to master in the C programming language. For this reason, a majority of students and even long-time professionals…

Read more »

Installing WinAFL

Win-AFL's documentation is fairly lacking when it comes to installation procedures with newer toolkits. Because of this, I decided to help the fuzzing and reverse engineering community by writing a…

Read more »

A Brief Introduction to RMF

Written by Immaculate Tact: I don’t pretend to cover new ground here, but RMF is as good a starting place as any. Every exploit eventually meets an equally adequate or…

Read more »

Fuzzing Explained with AFL

What is Fuzzing? Fuzzing is the act of generating a large number of inputs that can be either random or mutated from known good inputs. These inputs are then entered…

Read more »

VStarCam – An Investigative Security Journey – Part 1 – by RedCodeFinal

Today I wanted to talk about a project I’ve been working on, and detail some of the things I found and stuff I tried. I think it’ll be a good…

Read more »

social engineering part 2: real world attacks

     Picture this: it’s your first week at work, you just started working as a front desk manager at a major tech company. The boss is out of town…

Read more »

social engineering part 1: what is it?

     Picture this: it’s a late Thursday afternoon. You just got off work, you’re tired, and you want to relax. You sit down, turn on the tv, and browse…

Read more »

Learning C – Part 2 Functions

What is a Function? Functions serve as the foundation to almost any programming language. In our previous part we talked about Variables and Data types which will be critical in…

Read more »

Learning C – Part 1 Variables

“One man’s constant is another man’s variable” -Alan Perlis, Epigrams on Programming, 1982 To kick off our C series, I figured we should go over one of the most common…

Read more »

Attacks Explained – SQL Injection

SQL Injection (SQLi) About SQL Injection is an incredibly common form of attack that comes from non-sanitized inputs that communicate with an SQL Database of some form. While the exact…

Read more »