- MSF Serisi #4 MSF CONVERTERS
- MSF Serisi #3 Msfpc
- # Zeroday Exploit Nedir? #
- DrupalGeddon2 İle Sitelere Sızın
- MSF Serisi #2 Msfcli gibi Msfconsole
- MSF Serisi #1 M3tâsploit
- DrupalStrike Drupal Exploit ve Arama Motoru
- Exploit Nedir? - Exploit Türleri
- Little Endian ve Big Endian Nedir?
- Egg Hunting Nedir?
- Bellek Tabanlı Taşma Teorisi ve Çeşitleri
- terminal escape injection zaafiyeti ve exploit edilmesi
- Exploitler Nedir//Nerede kullanılır//Çeşitleri Nelerdir?
- Windows Heap Exploitation #4 | Heap Overflows 102.5
- Windows Heap Exploitation #3 | Heap Overflows 102
- Linux Exploit Geliştirme Serisi #3 | Arabellek Aşımı [Pwnable.kr -> bof]
- Linux Exploit Geliştirme Serisi #1 | Linux Exploit Geliştirmeye Giriş
- Windows Heap Exploitation #1 | Giriş
- Windows Exploit Geliştirme Serisi #16 | Kernel Exploitation -> Pool Overflow
- Windows Exploit Geliştirme Serisi #2 | Saved Return Pointer Overflows
- Windows Exploit Geliştirme Serisi #15 | Kernel Exploitation -> UAF
- Windows Heap Exploitation #6 | Heap Overflows 103.5
- Windows Heap Exploitation #5 | Heap Overflows 103
- Windows Exploit Geliştirme Serisi #17 | Kernel Exploitation -> GDI Bitmap Abuse (Win7-10 32/64bit)
- Windows Heap Exploitation #2| Sürücü güvenlik açığı
- Windows Exploit Geliştirme Serisi #3 | Structured Exception Handler (SEH)
- Linux Exploit Geliştirme Serisi #4 | Use-After-Free [Pwnable.kr ->uaf]
- Windows Exploit Geliştirme Serisi #4 Egg Hunters
- Windows Exploit Geliştirme Serisi #5 | Unicode 0x00410041
- Windows Exploit Geliştirme Serisi #15 | Kernel Sömürüsü-> UAF
- Windows Exploit Geliştirme Serisi #6 | W32 Shellcode Yazma
- Linux Exploit Geliştirme Serisi #2 | Linux Format String Exploiti
- Windows Exploit Geliştirme Serisi #9 | Yığın Püskürtmesi [2.Kısım: Use-After-Free] - Samanlıkta İğne Aramak
- Windows Exploit Geliştirme Serisi #19 | Kernel Exploitation -> Razer rzpnk.sys'deki mantık hataları
- Windows Exploit Geliştirme Serisi #18 | Kernel Exploitation -> RS2 Bitmap Necromancy
- Windows Exploit Geliştirme Serisi #11 | Kernel Exploitation -> Write-What-Where
- Windows Exploit Geliştirme Serisi #12 | Kernel Exploitation -> Null Pointer Dereference
- Windows Exploit Geliştirme Serisi #14 | Kernel Exploitleme -> Integer Overflow
- Windows Exploit Geliştirme Serisi #13 Kernel Exploitleme -> Uninitialized Stack Variable
- Windows Exploit Geliştirme Serisi #10 | Kernel Exploitleme -> Yığın Taşması
- Windows Exploit Geliştirme Serisi #8 | Yığın Püskürtme [Bölüm 1: Geleneksel EIP] – Samanlıkta İğne Aramak
- Windows Exploit Geliştirme Serisi #7 | Dönüş Odaklı Programlama
- Windows Exploit Geliştirme Serisi #1 | Exploit Geliştirmeye Giriş
- Exploit Nedir? | Önlenebilirmi?
- Student Enrollment 1.0 - Unauthenticated Remote Code Execution
- Odoo 12.0 - Local File Inclusion
- Online Student Enrollment System 1.0 - Unauthenticated Arbitrary File Upload
- WebPort 1.19.1 - Reflected Cross-Site Scripting
- WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting
- Frigate 2.02 - Denial Of Service (PoC)
- Responsive Online Blog 1.0 - 'id' SQL Injection
- Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)
- Code Blocks 20.03 - Denial Of Service (PoC)
- Lansweeper 7.2 - Incorrect Access Control
- FHEM 6.0 - Local File Inclusion
- OpenEMR 5.0.1 - 'controller' Remote Code Execution
- Windscribe 1.83 - 'WindscribeService' Unquoted Service Path
- KiteService 1.2020.618.0 - Unquoted Service Path
- Victor CMS 1.0 - 'user_firstname' Persistent Cross-Site Scripting
- Reside Property Management 3.0 - 'profile' SQL Injection
- RM Downloader 2.50.60 2006.06.23 - 'Load' Local Buffer Overflow (EggHunter) (SEH) (PoC)
- e-learning Php Script 0.1.0 - 'search' SQL Injection
- PHP-Fusion 9.03.60 - PHP Object Injection
- Online Shopping Portal 3.1 - Authentication Bypass
- Firebird 1.0.2 (FreeBSD 4.7-RELEASE) - Local Privilege Escalation
- Snitz Forums 3.3.03 - Remote Command Execution
- CDRTools CDRecord 2.0 (Mandrake / Slackware) - Local Privilege Escalation
- WsMp3d 0.x - Remote Heap Overflow
- Microsoft Windows XP - 'explorer.exe' Local Buffer Overflow
- Webfroot Shoutbox < 2.32 (Apache) - Local File Inclusion / Remote Code Execution
- Microsoft Windows - WebDAV Remote Code Execution (2)
- Microsoft IIS 5.0 < 5.1 - Remote Denial of Service
- Microsoft Internet Explorer - Object Tag (MS03-020)
- Student Enrollment 1.0 - Unauthenticated Remote Code Execution
- Odoo 12.0 - Local File Inclusion
- Online Student Enrollment System 1.0 - Unauthenticated Arbitrary File Upload
- WebPort 1.19.1 - Reflected Cross-Site Scripting
- WebPort 1.19.1 - 'setup' Reflected Cross-Site Scripting
- Frigate 2.02 - Denial Of Service (PoC)
- Responsive Online Blog 1.0 - 'id' SQL Injection
- Online Student Enrollment System 1.0 - Cross-Site Request Forgery (Add Student)
- Code Blocks 20.03 - Denial Of Service (PoC)
- Lansweeper 7.2 - Incorrect Access Control
- HardDrive 2.1 for iOS - Arbitrary File Upload
- Super Backup 2.0.5 for iOS - Directory Traversal
- Internet Download Manager 6.37.11.1 - Stack Buffer Overflow (PoC)
- EmEditor 19.8 - Insecure File Permissions
- hits script 1.0 - 'item_name' SQL Injection
- Druva inSync Windows Client 6.5.2 - Local Privilege Escalation
- ChemInv 1.0 - Authenticated Persistent Cross-Site Scripting
- VirtualTablet Server 3.0.2 - Denial of Service (PoC)
- Online Scheduling System 1.0 - Persistent Cross-Site Scripting
- Beauty Parlour Management System 1.0 - Authentication Bypass
- Edimax EW-7438RPn - Information Disclosure (WiFi Password)
- Edimax EW-7438RPn - Cross-Site Request Forgery (MAC Filtering)
- Mahara 19.10.2 CMS - Persistent Cross-Site Scripting
- User Management System 2.0 - Persistent Cross-Site Scripting
- User Management System 2.0 - Authentication Bypass
- Complaint Management System 4.2 - Persistent Cross-Site Scripting
- Complaint Management System 4.2 - Authentication Bypass