
What is Penetration Testing?
What is Vulnerability Scanning?
What is External Attack Surface Management (EASM)?

Common Vulnerability Management Challenges

Manually Implanting Backdoors in PE Files

Using an Egghunter to Exploit Minimal Buffer Overflows

Cyber Essentials Certified

An Introduction in Exploiting Basic Vanilla Buffer Overflows

