Exploit Articles
Articles about common exploits affecting Windows and Linux system.
Information contained in these articles have been sourced from various sites during the course of my studies. I have tried to construct the articles in such a way that it would be easy for beginners in the field (Infosec, or Information Security) to understand. The material provided here is intended solely for educational purposes only. I intend no copyright infringement of any kind. List of sites I have collated the material from, will be mentioned wherever possible. The reader accepts full responsibility for the use of the information provided. While every attempt has been made to ensure that the information contained in these articles has been obtained from reliable sources, I am not responsible for any errors or omissions, or for the results obtained from the use of this information.
It is an unsafe and rather risky practice to copy any script from the internet and paste it into your terminal without knowing what the script really does. Read the script carefully and always use virtual machines to practice your hacking skills. Do not attack machines unless you have explicit written permission to do so. Take periodic snapshots of your virtual machines so that you don’t have to rebuild one from scratch if something goes wrong during the course of your learning.
We are here to make our computers and networks safe from threats. Understand your responsibilities, please.