Cybersecurity on your mind?

We are here to help

Latest from Exploit-RE

DeviceViewer (SEH Overwrite exploit)

This assignment was submitted by Michael Ross (@mprossau) as part of our Hands-on Exploit Development course Learn more

CloudMe Sync 1.11.0 – Local Stack-based Buffer Overflow (Powershell)

The following post explain how to exploit a stack-based buffer overflow vulnerability in CloudMe Sync v1.11.0 via PowerShell Learn more

Visit Exploit-RE

Our Top Courses

4.50 /5.0
Adversary Emulation 101: Mimicking a real-world cyber attack

Enroll in this course During an adversary emulation exercise we mimic a real world cyber attack with a… Read more

4.63 /5.0
Hands-on Exploit Development

What you'll learn Exploit Development Basics of Buffer Overflow Protocol and File Format Fuzzing Hacking Requirements Have basic… Read more

View All Courses

Protect Your Business

We offer a variety of cybersecurity services to keep your business safe from cyber criminals

Learn more

Enhance Your Security Skills

Sign-up for our online training courses and security labs

Learn more

Cybersecurity Research

Subscribe to our research articles to stay updated

Subscribe Now