Main research penetration, offensive and defensive, direction of network security audit etc,
Code files or POC named after platform-(released)-software(version)-exploit(name)
- platform: linux and unix or windows
- version:
*(All version general)
- version:
- platform version used released version,example:
Linux-centos7 or Windows-7
- software version: used software version
- exploit: a leak the name
A Linux platform php5.4 unserialize use example:
linux-*-php5.4-unserialize-exploit.php
Server security research and learning.
- Server environment set up
Web security research and learning.
- Web environment set up