Skip to content

Stuff With Aurum

Where I do stuff

  • About

Month: July 2015


Linux (x86) Exploit Development Series

Posted on July 17, 2015

Amazing tutorials for linux exploit development!

Share this:

  • Twitter
  • Facebook
  • LinkedIn
  • Reddit
  • More
  • Print
  • Tumblr
  • Pinterest
  • Pocket
  • Telegram
  • WhatsApp
  • Email

Like this:

Like Loading...
Leave a comment     


Recent Posts

  • Creating an AWS Sandbox
  • Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • An Innovative Phishing Style
  • Linux (x86) Exploit Development Series
  • Exploit Development: Stack Buffer Overflow – Bypass NX/DEP

Recent Comments

  • 靶场练习 - Metaploitable1 - 清风. on Metasploitable Walkthrough: An Exploitation Guide
  • IS on Exploit Development: Stack Buffer Overflow – Bypass NX/DEP
  • Harjoitus 5 – Justuksen Blog on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Rikky on Metasploitable 3 (Linux) Walkthrough: An Exploitation Guide
  • Metasploitable 3 (Linux): An Exploitation Guide – Stuff With Aurum on Metasploitable 2 Walkthrough: An Exploitation Guide
BlogBD WordPress Theme
%d