July 2, 2025
Discover a wealth of knowledge on cybersecurity topics through our articles, research, and publications. Stay informed with the latest insights and trends in the industry, and learn how to better protect your organisation against cyber threats.
Whether you’re looking for in-depth analyses, practical guides, or the latest research findings, our content is intended to share our knowledge and expertise in the field of cybersecurity.
An overview on implanting shellcode into a PE file: adding sections, patching entry points and restoring execution flow for stealth backdoors.
Learn how to exploit a stack overflow using an egghunter to achieve remote code execution to obtain a shell
Exploitr has achieved the Cyber Essentials certification, demonstrating our commitment to cybersecurity best practices and secure services.
Learn how to exploit basic buffer overflows using debugging, fuzzing, and shellcode execution to achieve remote code execution.
Dive into the WPA/WPA2 PSK Wi-Fi authentication process, how it works with key components like PMK, PTK, MIC, and how vulnerabilities can be exploited.