Skip to main content
This is currently an alpha release and I'm looking for constructive feedback, please
file any issues on Github.
Course
Blog
GitHub
[Lab 2] Defending a vulnerable application
2. Decide what attacks we want to protect against
Overview
Previous
1. Setup Shellcode Eater with our examples and then write your own too!
Next
3. Generate a templated policy as our starting point