by Morten Schenk Windows 10 1809 Kernel ASLR Bypass Evolution When it is well-implemented, Kernel Address Space Layout Randomizati...
Blog
News and updates from OffSec
Our Advanced Web Attacks and Exploitation (AWAE) live training course has been one of the fastest-selling classes at various indus...
Last week, an individual started to release solutions to certain challenges in the OSCP certification exam. This led to some discu...
Today we all constantly read about data breaches that could have been prevented if the impacted organization had just done what th...
Offensive Security is delighted to announce the complete redesign of The Exploit Database (EDB), making it easier and faster than ...
It’s been a busy few months for us here, and for good reason. Today we are proud to announce our new partners at Offensive Secur...
When we started out with our online training courses over 12 years ago, we made hard choices about the nature of our courses and c...
Recently, my manager purchased a Synology NAS device for me to do some backups. Since quite a few people I know use this particula...
Some time ago, we noticed some security researchers looking for critical vulnerabilities affecting "security" based products (such...
A few months ago, we decided to make a new module for our Advanced Windows Exploitation class. After evaluating a few options we c...
Admittedly, somewhat of a click-bait blog post title - but bear with us, it's for a good reason. Lots of work goes on behind the s...
Managing the Exploit Database is one of those ongoing tasks that ends up taking a significant amount of time and often, we don't t...