Latest Posts - Page 3

Nov 12

Building A Compact XOR Encoder

Author: TheXero | Category: blog

The majority of memory corruption exploits that exist, have some form of input character limitation. To get around these limitations, you have what is known as an encoder. By encoding the input ...


Read More
May 09

Worldmail Exploit

Author: TheXero | Category: exploit-development

The first public exploit we released was for the Eudora Qualcomm IMAP server commonly known as Worldmail. This exploit was classified as a Structured Exception Handler (SEH) buffer ...


Read More
May 03

nullsploit engine

Author: TheXero | Category: tools

The nullsploit engine is a work in progress exploitation framework. Currently only a limited number of exploits are available, but these should be stable across multiple Windows installations. Features...


Read More
Sep 28

Housing Technology Interview

Author: TheXero | Category: blog

Recently, I was interviewed by Housing Technology magazine, about what housing providers should be considering in the context of cyber-security and data protection. The full aricle can be ...


Read More