OSIRIS Blog
  • Home
  • About
Sign in Subscribe

The Impact of Recent Cyber Attacks on Popular Platforms

Words like “privacy” and “confidentiality” and “cyber-security” are thrown around frequently in
Read More
Vaughn Valle (8bitrosso)

HowTo: Writing into process memory with GDB.

Use this .gdbinit. Make sure you save it as your ~/.gdbinit file
Read More
Vaughn Valle (8bitrosso)

HowTo: Turn off Linux Security Mechanisms

You are probably going to want to do this to make your
Read More
Vaughn Valle (8bitrosso)

HowTo: Using MSF to Make Linux Shellcode

Here's a quick one liner to make linux shell code
Read More
Vaughn Valle (8bitrosso)

Rationality & Privacy: How People Make Decisions About Confidentiality

“In everything one thing is impossible: rationality.” –Friedrich Nietzsche Unfortunately, Nietzsche’s
Read More
Vaughn Valle (8bitrosso)

FORTIFY_SOURCE Semantics

The GNU Compiler Collection has a FORTIFY_SOURCE option that does automatic
Read More
Vaughn Valle (8bitrosso)

OWASP VicNum Project

Vicnum is a training game put out by OWASP. If you play
Read More
Vaughn Valle (8bitrosso)

Simple Intro to Interposition in C

This is a toy program that we want to monkeypatch. It really
Read More
Vaughn Valle (8bitrosso)

Beware: A New Approach To Cyber Security That's Not Safe For Coders

Hi there! So this post will be the first in a series
Read More
Vaughn Valle (8bitrosso)

Gera's Insecure Programming Format String #1

A well-known set of vulnerable programs to practice exploitation can be found
Read More
Vaughn Valle (8bitrosso)

HowTo: Metasploit Autopwn Quick Guide

1. Run metasploit: $ ./msfconsole 2. Create the database which metasploit uses to
Read More
Vaughn Valle (8bitrosso)

Weaponizing a XSS vulnerability.

During a recent Hack Night, we tested some Content Management Systems and
Read More
Vaughn Valle (8bitrosso)
OSIRIS Blog © 2026
  • Sign up
Powered by Ghost