👋 Welcome to the site!

First and foremost, I like to keep the focus on learning and responsible research here. It's exciting to explore offensive security tradecraft, don't get me wrong. But I'd like to recognize the importance behind responsible use of the techniques and code I share on this blog. My goal is to enhance security not abuse it. Okay! With that little disclaimer out of the way, enjoy your stay and hit me up on discord if you want to learn more about a given topic, etc.

Quick links to popular content can be found below:

Shellcoding/x64 Assembly Series
UAC Bypass Techniques
Create your own Netcat using Python

Recent posts

x64 Assembly and Shellcoding 101 - Part 5

7 minute read

Well, you will all be happy to know I’m finally keeping my word and doing what I promised early on in the series…We’re going to do the following today:

x64 Assembly and Shellcoding 101 - Part 4

6 minute read

Hey all! This will be a shorter post today, so I’ll get right to it. Let’s talk shellcode basic encoding functionality built in to x64 assembly instruction...

x64 Assembly and Shellcoding 101 - Part 3

6 minute read

Now is the time for the expected continuation of part 1 of this blog series, where we clean up our code and remove those NULLs. In this way, we’ll be able t...

x64 Assembly and Shellcoding 101 - Part 2

3 minute read

Okay, I lied 😄 I thought I’d use part 2 to discuss removing NULL bytes, and that’s going to happen I promise! But I had some good feedback from the first p...

x64 Assembly and Shellcoding 101

16 minute read

I have admittedly scoured the internet looking for examples of basic x64 shellcode development and have not had much luck. So many tutorials and lessons see...