👋 Welcome to the site!

First and foremost, I like to keep the focus on learning and responsible research here. It's exciting to explore offensive security tradecraft, don't get me wrong. But I'd like to recognize the importance behind responsible use of the techniques and code I share on this blog. My goal is to enhance security not abuse it. Okay! With that little disclaimer out of the way, enjoy your stay and hit me up on discord if you want to learn more about a given topic, etc.

Quick links to popular content can be found below:

Shellcoding/x64 Assembly Series
UAC Bypass Techniques
Create your own Netcat using Python

Recent posts

Buffer Overflows in the Modern Era - Part 5

10 minute read

It’s the moment you’ve all been waiting for. I realize I’ve been building anticipation for the actual bypassing ASLR aspect of this series for a long time n...

Buffer Overflows in the Modern Era - Part 4

14 minute read

Well we’re almost there guys! First, let’s go over what we’ve accomplished so far. We have explored, quite in depth I might add, the useage of x64dbg. You...

Buffer Overflows in the Modern Era - Part 3

20 minute read

Hey welcome back! If you’ve followed along up until this point, you should have a decent handle on navigating x64dbg as well as crafting your buffer overflow.