I’m a Vulnerability Reseacher for desktop apps. I’ve made quite a few vulnerability research , especially on memory corruption. Now, I am doing more interested on browser security & writting some malware poc for fun.

email: aronimperial20[at]gmail.com

My Vulnerability Research Training

‭300‬ Days
Advanced Vulnerability Research Training

  • Intro to Browser Exploitatio(windows xp)
  • Browser Exploitation
    • Intro to heap (browser) exploitation
    • Memory leaks
‭225‬ Days
Vulnerability Research Training

  • C/C++ Skills
  • Basic Reversing
  • Immunity Debugger
  • Wingdb
  • IDA Pro
  • More Topics About Exploit Development
    • Egghunter
‭150‬ Days
Introduction To Exploit Development Training

  • WinDbg
  • Mona 2
  • Structure Exception Handling (SEH)
  • Heap
  • Windows Basics
  • Introduction to shellcoding
    • Manual
    • Msfvenom
    • Call / jmp / push esp technique
    • Pop pop ret
    • Call / jmp [reg + offset]
  • Fuzzing
    • Boofuzz
    • PeachFuzz
  • Exploitme1 (ret eip overwrite)
    • The Right Module
    • Bad Characters
  • Exploitme2 (Stack cookies & SEH)
    • Non-safeseh Modules
    • Bypassing Safeseh
  • Exploitme3 (DEP)
    • Rop Chain
    • Ret2libc
  • Exploitme4 (ASLR)
    • Non-Aslr
    • 2 Byte Overwrite
  • Metasploit Modules TCP/UDP
  • 75 Days
    PWK Course / OSCP Training

    • Information Gathering
    • Vulnerability Identification and Prioritization
    • Password Cracking & rule based
    • Research and Development
    • Exploitation
    • Linux & windows Local Privilege Escalation
    • Post-Exploitation
    • Expanding Influence
    • Client Side Attack Against Internal Network
    • Privilege Escalation Through AD Misconfigurations
    • Port Tunneling
    • SSH Tunneling with HTTP Encapsulation
    • Looking for High Value Targets
    • Exfiltration techniques
    • Domain Privilege Escalation