Skip to content
JSecOps
Software Development and Security Research
Home
Articles
Foundational Knowledge
Computing
Introduction to Computing – The Basics Part 1
Introduction to Computing – The Basics Part 2
Introduction to Computing – The Basics Part 3
Introduction to C and Assembly on Windows
Introduction to C and Assembly on Linux
Introduction to Security Research
Introductions to Security Research – Windows
Introduction to Security Research – Vulnerable Win 10 Setup
Introductions to Security Research – Windows – Permissions
Introductions to Security Research – Win – Privilege Escalation Tools
Introductions to Security Research – Win – Service Exploits
Introductions to Security Research – Win – Kernel Exploits
Introductions to Security Research – Win – Additional Attacks
Introductions to Security Research – Win – PowerShell and User Privs
Introductions to Security Research – Win – Privilege Escalation Strategies
Introduction to Security Research – Linux
Introduction to Security Research – PreReq – *Nix Exp 1-5
Introduction to Security Research – PreReq – *Nix Exp 6-14
Introduction to Security Research – PreReq – *Nix Exp 15-16
Overview of .EXE and .DLL Files in the .NET world
ELF Binaries Overview
Introduction to Physical Penetration Test – Overview
Introduction to Physical Penetration Testing Part 1 – Basic Lockpicking
Dot NET Security
Exploiting C Sharp Apps
Commando VM
Web Application WebGoat.NET
Web Attacks – XSS, SSTI, Insecure Deserialization, and APIs
Windows Thick Client (Desktop App) Security
Pen Testing Windows
Penetration Testing a Windows Environment Part 1
DevSecOps
Secure Development
Software Development Lifecycle
Secure Software Development – Foundations
Secure Software Development – Microsoft
Windows Thick Client Code Review and Security Fixes
Secure CSharp Development
Testing with Selenium
Automated Testing with Selenium – Part 1
Automated Testing with Selenium and C# – Part 2
Automated Testing with Selenium and C# – Part 3
Automated Testing with Selenium and C# – Part 4
Blog
Consulting Services
Custom Software Development
Security Code Reviews and Testing
Introductions to Security Research – Win – Kernel Exploits
Home
»
Articles
»
Foundational Knowledge
»
Introduction to Security Research
»
Introductions to Security Research – Windows
»
Introductions to Security Research – Win – Kernel Exploits