LLM Tokens, Context Windows, and the Attack Surface
Understand how large language models process text through tokenization, manage context windows, and where these mechanics create exploitable attack surface for red teamers.
Read the tutorial
→ Feb 20, 2026
intermediate WebMCP Attack Surfaces: When AI Agents Call Your Website
Build a web app that exposes tools to AI agents via WebMCP, then demonstrate four attack classes: tool poisoning, schema mismatch, response injection, and cross-tool exfiltration.
Read the tutorial
→ Container Escape: Namespace and Privilege Breakouts
Exploit four container escape techniques — privileged mounts, Docker socket abuse, namespace escapes, and cgroup release_agent — then harden against each one.
Read the tutorial
→ Training a ROP Gadget Classifier with XGBoost
Build a machine learning classifier that predicts whether a ROP gadget is useful for exploit chains, using features extracted from x64 disassembly and XGBoost.
Read the tutorial
→ Attack Surface Analysis of a Minimal Embedded Linux Image
Build a stripped embedded Linux image with Buildroot, then systematically audit it: open ports, exposed syscalls, suid binaries, kernel modules, and writable paths — then harden it and measure the difference.
Read the tutorial
→ Firmware Extraction and Reverse Engineering with Binwalk and Ghidra
Extract firmware from an IoT device update file, unpack the filesystem, identify interesting binaries, and reverse engineer them in Ghidra to find real vulnerabilities.
Read the tutorial
→ Dec 18, 2025
intermediate Cross-Compiling and Debugging with Buildroot, QEMU, and GDB
Set up a complete embedded Linux development environment: build a custom ARM image with Buildroot, boot it in QEMU, and remotely debug binaries with GDB — no hardware required.
Read the tutorial
→ Dec 11, 2025
intermediate Anomaly Detection on Linux Audit Logs with Isolation Forest
Build a lightweight anomaly detection pipeline that flags suspicious Linux sessions using auditd logs, feature engineering, and scikit-learn — no GPU required.
Read the tutorial
→ Build a Local RAG Pipeline with Ollama and ChromaDB
A hands-on guide to building a retrieval-augmented generation pipeline that runs entirely on your machine, using security advisories as the knowledge base.
Read the tutorial
→ Writing Your First Wazuh Custom Decoder and Rule
A step-by-step guide to writing custom Wazuh decoders and rules, from reading a raw syslog line to triggering an alert.
Read the tutorial
→ Nov 13, 2025
intermediate Recovering from a Pop!_OS Kernel Panic on System76
Step-by-step recovery for a Pop!_OS kernel panic after an interrupted update.
Read the tutorial
→ Windows Egghunter Exploitation
Use egghunter shellcode to locate and execute a larger payload when buffer space is limited.
Read the tutorial
→ Windows SEH Overflow Exploitation
Exploit Structured Exception Handler (SEH) overflows on Windows, bypassing SafeSEH protections to achieve code execution.
Read the tutorial
→ Oct 23, 2025
intermediate Windows Stack Buffer Overflow
Exploit a classic stack buffer overflow on Windows, from crash discovery to shellcode execution using Immunity Debugger and mona.py.
Read the tutorial
→ Remote Exploitation with Socket Reuse Shellcode
Exploit a remote x86 Linux service by leaking addresses to bypass PIE, splitting shellcode across discontinuous buffers, and reusing the existing socket to evade firewall rules.
Read the tutorial
→ Bypassing ASLR on x64 Linux
Defeat Address Space Layout Randomization by leveraging fixed addresses in the binary when PIE is disabled.
Read the tutorial
→ Bypassing NX with mprotect ROP Chains
Use Return-Oriented Programming to call mprotect() and make stack memory executable, then jump to shellcode on x64 Linux.
Read the tutorial
→ Bypassing NX with ROP on x64 Linux
Use Return-Oriented Programming to bypass NX protection on 64-bit Linux, chaining gadgets to call system() with /bin/sh.
Read the tutorial
→ Sep 18, 2025
intermediate ROP Gadget Hunting Toolkit: ropper, ROPgadget, and GDB-PEDA
A practical reference for finding, filtering, and verifying ROP gadgets using ropper, ROPgadget, and GDB-PEDA. Covers common workflows, advanced filtering, and chaining strategies.
Read the tutorial
→ Sep 11, 2025
intermediate Stack Buffer Overflow on x64 Linux
Exploit stack buffer overflows on 64-bit Linux systems, understanding the differences from x86 including register usage and address handling.
Read the tutorial
→ Return-to-libc Attack on x86
Bypass NX protection by returning to libc functions instead of executing shellcode on the stack. Learn to leak addresses and chain function calls.
Read the tutorial
→ Redirecting Execution to Hidden Functions
Learn how to exploit a basic stack buffer overflow to redirect execution to a hidden function in a SUID binary and gain elevated privileges.
Read the tutorial
→ Aug 21, 2025
intermediate Basic Stack Buffer Overflow on x86
A comprehensive guide to exploiting stack buffer overflows on 32-bit Linux systems, from vulnerability discovery to shellcode execution.
Read the tutorial
→ Aug 14, 2025
intermediate Linux Syscalls for Exploit Development
How Linux syscalls work at the instruction level — int 0x80 vs syscall, register setup, and the key syscalls used in shellcode and ROP chains.
Read the tutorial
→ The Stack: Memory Layout and Function Frames
How the stack works in x86 and x64 Linux — process memory layout, push and pop mechanics, function prologues and epilogues, and why buffer overflows can overwrite the return address.
Read the tutorial
→ x86 and x64 Registers and Calling Conventions
A practical guide to CPU registers, partial register access, flags, and how function arguments are passed on x86 and x64 Linux.
Read the tutorial
→ Arch Linux Installation Guide
A comprehensive guide to installing Arch Linux with full disk encryption, secure boot, and hardened security configuration.
Read the tutorial
→
No tutorials match the selected topic.