- π Iβm co-founder and CEO of Sec4US
- π Iβm currently learning Low Level stuffs and studing to OSEE
- π Iβm the first to earn OSCE3 in Latin America
- π I hold the majors offensive security certifications OSCE3, OSEP, OSED, OSWE, OSCE, OSCP, eMAPT, eCXD, CEH
- π I regularly (or not) write articles on https://www.helviojunior.com.br
- π¬ Ask me about buffer overflow, assembly, shellcoding, binary exploitation, exploit dev, malware dev, network, mobile pentesting and Source Code Review and so on
- π« How to reach me [email protected]
Note: Only on Brazilian language (Portuguese)
- Using Windows In/Direct System call to bypass AV/EDR
- Mini Treinamento Mobile Exploitation
- Windows ROP - Return Oriented Programming
- Linux ROP - Return Oriented Programming
- Shellcode para desenvolvimento de exploits
- Printable ASCII Shellcode
- Assumindo o controle total da sua rede em menos de 1 hora, o ataque e suas principais defesas
- Post exploitation com anΓ‘lise de dump de memΓ³ria