Latest Posts

Nov 12

Building A Compact XOR Encoder

Author: TheXero | Category: blog

The majority of memory corruption exploits that exist, have some form of input character limitation. To get around these limitations, you have what is known as an encoder. By encoding the input ...


Read More →
May 03

nullsploit engine

Author: TheXero | Category: tools

The nullsploit engine is a work in progress exploitation framework. Currently only a limited number of exploits are available, but these should be stable across multiple Windows installations. Features...


Read More →
Sep 28

Housing Technology Interview

Author: TheXero | Category: blog

Recently, I was interviewed by Housing Technology magazine, about what housing providers should be considering in the context of cyber-security and data protection. The full aricle can be ...


Read More →