The Armored Code
A blog talking about offensive and defensive security and how to craft software in a secure way
Joining the Peerlyst tribe
Starting from this month, some posts written here on Armored Code will be available also on peerlyst.
21 May 2019
A tale of a restricted charset shellcode generation
During my OSCE exam preparation I had to deal with shellcode writing experience where very few allower characters were available.
19 Apr 2019
Create your own telemetry system
In order to monitor dawnscanner security scaner usage, I introduced in upcoming version 2.0.0, a telemetry system.
17 Apr 2019
How an excercise eventually becomes my first public exploit
A couple of days ago, I was working on my exploit-writing routine as preparation for my upcoming OSCE examination.
26 Mar 2019
Backflip into the stack
During my OSCE journey I came across an interesting technique to jump backwards into the very beginning of the buffer injected on the vulnerable process.
19 Mar 2019
A closer look to msf-egghunter
The egghunting is a technique used in exploit writing to deal with evil shellcode to be placed in a memory location different from the one we are redirected via EIP...
22 Feb 2019
Never miss a
from us, subscribe to our newsletter