If you're still battling netcat for stable reverse shells over shaky connections?
Replace nc -lvnp <port> with:
socat TCP-L:<port> EXEC:'bash -li',pty,stderr,setsid,sane
TTY hell is optional. socat gives you a proper interactive PTY every time.
If you're still battling netcat for stable reverse shells over shaky connections?
Replace nc -lvnp <port> with:
socat TCP-L:<port> EXEC:'bash -li',pty,stderr,setsid,sane
TTY hell is optional. socat gives you a proper interactive PTY every time.
💥 Push, Pop, Boom.
Corelan Stack isn’t just another exploit dev course — it’s where things finally click.
Expert-level stack exploitation. Zero fluff. The OG.
🧠 Hands-on labs that challenge.
🔥 Taught by a pioneer in the field.
"Filled in gaps I didn’t even know I had." — Fabio, Brazil
👉 https://bit.ly/corelan-training
#Corelan #Stack #Windows11 #ExpertLevel #ExploitDev #Cybersecurity #Infosec #Hacking #Training
Go beyond just using Metasploit – learn to build with it.
This comprehensive 2nd Edition guides you with foundational commands through porting public exploits (Chapter 12), building your own modules in Ruby (Chapter 13), and even fuzzing for novel vulnerabilities (Chapter 14).
Elevate individual skills while enriching the broader field. #Metasploit #InfoSec #ExploitDev #CyberSecurity
Your exploit dev training journey starts right here!
Corelan’s “Expert-Level Stack” exploit dev course for Windows 11 delivers unmatched depth, quality, and hands-on experience.
What our students say on the #Corelan Stack course:
🗣️ “Peter will refute about every single thing you might have learned so far related to the topic in other courses… and then teach you it the right way from the ground up”
See for yourself: 👉🏼👉🏼👉🏼 https://bit.ly/corelan-training
Moving from Slack to Discord. You're welcome to join, hang out, contribute to the community. Be nice. discord.gg/DjfR5ntXrb #corelancommunity #corelantraining #exploitdev #safeplace
Still looking for a reason to take a Corelan Training?
👇👇👇👇👇
https://bit.ly/corelan-training
5 reasons to take a 𝑪𝒐𝒓𝒆𝒍𝒂𝒏 class:
💛 All created & taught by @corelanc0d3r - It's a real class, yo
💭 Real skills, No hand-holding
🔬 Unmatched depth in stack & heap coverage
💪🏼 Mastery, not just basics
💰 Exclusive post-training support
#corelan #stack #heap #exploitdev #windows11 #corelantraining #masterclass
👉🏼 Sign up NOW, find out for yourself 👉🏼 https://bit.ly/corelan-training
🙏🏻 Sharing is caring 💛
𝑪𝒊𝒂𝒐 𝑰𝒕𝒂𝒍𝒚, 𝑪𝒊𝒂𝒐 𝑹𝒐𝒎𝒂! 𝑹𝒆𝒂𝒅𝒚 𝒇𝒐𝒓 𝑪𝒐𝒓𝒆𝒍𝒂𝒏?
Sign up for our Expert-level stack class: https://bit.ly/corelan-training
Still looking for a reason to take a Corelan Training?
👇👇👇👇👇
https://bit.ly/corelan-training
Already enjoying the https://exploits.club/ newsletter. Don't let the "coming soon..." website fool you, the content is high quality.
Hey if you are into #exploitdev and binary exploitation maybe you will enjoy reading my two latest blog post about exploiting some memory corruption vulnerabilities found on a students project. The second post was even posted on the exploits.club newsletter.
Post 1 https://lucabtz.com/blog/attempt-at-pwning-a-chip8-emulator
Post 2 https://lucabtz.com/blog/attempt-at-pwning-a-chip8-emulator
How common is RC4 vs. RC5 in the wild? I assume there's still plenty of vulnerable legacy software out there that's still using RC4. Would still supporting RC4 be useful for writing exploits or diminishing returns?
#exploitdev #ExploitDevelopment
ronin-exploits 1.0.6 and 1.1.0.rc2 have been released.
https://ronin-rb.dev/blog/2024/06/28/ronin-exploits-1.0.6-and-1-1-0-rc2-released.html
#ronin #roninrb #ruby #infosec #securitytools #exploitdev #opensource
How useful would you say a command injection payload that exfils a single file via curl
to a webserver might be? Do you think it should be built-in to a framework or offered as a 3rd-party thing?
#pentesting #exploitdev #payloads
For a tool that compiles C payloads, how would you prefer to specify the cross-compiler?
#payloads #pentesting #redteaming #exploitdev
What is a good example vulnerability that I could use to write a "How To Write An Exploit" style tutorial?
#exploitdev #xdev #vulndev
Finding deserialization bugs in Solarwinds: https://www.zerodayinitiative.com/blog/2023/9/21/finding-deserialization-bugs-in-the-solarwind-platform #exploitdev
This week was the last public class of 2023, we’re already filling up the agenda for 2024. However, we still have some timeslots for private classes. (either at your company or in Belgium, for small groups). Interested? DM for info! #corelan #exploitdev #windows11 #stack #heap
Stoked for class this week at Deep Conference (Zagreb, Croatia), Ready to give my all. Bring it on folks! #excited #corelan #bootcamp #exploitdev #windows11 #inpersontraining