Exploit Development

This category details the process of developing custom exploit code for software vulnerabilities, as well as some of the more common difficulties and mitigation techniques introduced as part of modern Operating Systems.


May 09

Worldmail Exploit

Author: TheXero | Category: exploit-development

The first public exploit we released was for the Eudora Qualcomm IMAP server commonly known as Worldmail. This exploit was classified as a Structured Exception Handler (SEH) buffer ...


Read More
Oct 26

Abusing The Stack

Author: TheXero | Category: exploit-development

Abusing the Stack is a full tutorial, detailing the process of vulnerability discovery to developing custom exploit code to take advantage of a vulnerability. Once you have successfully been through...


Read More