by The Ethical Hacking Guru | Jul 28, 2021 | Exploit Development, Redteam
In this tutorial, you will learn how to write a reverse shell in Nim to bypass antivirus detection. What Is Nim? Nim is a scripting language similar to Python in syntax, but close to Golang in that it requires statically typed variables and it compiles its programs....
by The Ethical Hacking Guru | Sep 26, 2019 | Exploit Development, Redteam
This is the Automate Buffer Overflow Exploitation with Bofhelper post in which I demonstrate the use of this incredible ethical hacking tool. Buffer overflows take time, too much time. Not just that, they also are difficult. Finding which characters have to be...
by guru | Jul 9, 2019 | Exploit Development, Programming, Python
When I started learning Go I quickly learned about the benefits of concurrent programing. So when I got a grasp of it in Go, I wondered if Python supported the same thing. Surely Python does, give it is so popular and a modern scripting language. The problem I found...
by guru | May 26, 2019 | Exploit Development, Redteam
If your weak area is buffer overflow exploits then vulnhub’s Brainpan is the vm you need to conquer. This is the vulnhub Brainpan walkthrough for Kali Linux. Want to setup a home pentesting lab to practice your ethical hacking skills? I spell out how it’s done...
by The Ethical Hacking Guru | May 25, 2019 | Exploit Development, Redteam
Before I wrote this post I could not find a good example with a full explanation for how writing a buffer overflow exploit works. This is the buffer overflow guide for Kali Linux. In plain English a buffer overflow exploit works by sending a buffer that is larger than...
by The Ethical Hacking Guru | May 5, 2019 | Exploit Development, Go, Redteam
In this hacking tutorial I cover how to write a reverse shell in go. Why learn go? Go is compiled so it’s extremely fast and one of the most modern programming languages there is. Interested in writing a Python reverse http shell? See Learn Python By Writing A...