Google
This is Mike's page

Windows Exploit Development – Part 6: SEH Exploits

Written on:March 25, 2014
Comments
are closed
win_exploit_6_1

Passive Reconnaissance

Written on:February 5, 2014
Comments
are closed
passive_recon_9

Securing Healthcare.gov – Failures, Fixes, and Next Steps

Written on:January 17, 2014
Comments
are closed

How NOT To Restrict Cross-Domain Flash Content

Written on:January 8, 2014
Comments
are closed
flash_5

Windows Exploit Development – Part 5: Locating Shellcode With Egghunting

Written on:January 5, 2014
Comments
are closed
win_exploit_5_7

Windows Exploit Development – Part 4: Locating Shellcode With Jumps

Written on:December 29, 2013
Comments
are closed
win_exploit_3_45

Windows Exploit Development – Part 3: Changing Offsets and Rebased Modules

Written on:December 29, 2013
Comments
are closed
win_exploit_3_9

Bug Bounty Blitz!

Written on:December 18, 2013
Comments
are closed

Windows Exploit Development – Part 2: Intro to Stack Based Overflows

Written on:December 13, 2013
Comments
are closed

Windows Exploit Development – Part 1: The Basics

Written on:December 6, 2013
Comments
are closed
Immunity CPU View