Exploit-RE by Yaksas CSC

A dedicated place to host our research in Exploit Development and Reverse Engineering

Yaksas CSC Home Blog Acknowledgements About

CloudMe Sync 1-11-0 - Local Stack-based Buffer Overflow Powershell

The following post explain how to exploit a stack-based buffer overflow vulnerability in CloudMe Sync v1.11.0 via PowerShell

Read More

DeviceViewer 3.12.0.1 (SEH Overwrite exploit)

This assignment was submitted by Michael Ross (@mprossau) as part of our Hands-on Exploit Development Course

Read More

JetAudio jetCast Server 2.0 (Stack-based buffer overflow exploit)

This assignment was submitted by Michael Ross (@mprossau) as part of our Hands-on Exploit Development Course

Read More

Creating Linux TCP Bind Shellcode

The TCP bind shell is used to setup a listener (or server) on the target machine which allows the attacker machine to execute commands on the said machine.

Read More

Welcome to Exploit-RE!

This website will hold resources dedicated to Exploit Development and Reverse Engineering

Read More