Become a sponsor to Milton Valencia
Support The Quest - World Domination
[Interviewer]
Yeah, yeah, that's cool
So what's like, I mean what's like
Your ultimate goal against in this in this industry?
[Method Man]
Domination, baby, fuck that
Table of Contents
Why Sponsor
Ever since embarking on my hacking journey beginning with the OSCP. I have learned to be as effective as possible you must consume quality educational material. This is crucial, mission critical and absolutely necessary.
As I get older my goal is to provide information to the next generation of hackers that have a strong desire to dive into binary exploitation and true computer operations that can only be understood at the lowest level.
That said I want to bring you information that is easily digestible and worthy of your time.
Completed Projects
- AWAE-PREP
- A guide containing subject matter I completed that allowed me to pass the OSWE certification. Unlike most guides I won't be throwing a bunch of links at you. EVERYTHING within this guide directly contributed to my success within the WEB-300 course.
- MBE NOTES
- A organized collection notes taken during my completion of the Modern Binary Exploitation course. This was released with permission of the original authors. That's right! A 300+ page guide that walks you through different attack techniques against the x86 architecture such as bypassing DEP and ASLR along with Heap and Kernel Exploitation. As an aside I heavily recommend their WarGames course which covers the x64 architecture and additional techniques not covered in MBE. Having spoken with the authors and being allowed to release the aforementioned PDF speaks volumes as to selecting them for future trainings. I will personally be taking their course as they release. You can find my review to WarGames on my Linkedin.
- CA Unified Infrastructure Management Research
- This was 0day research I conducted on the Nimsoft protocol. This repository contains all code created during the discovery of 3 0days. Two of which resulted in remote code execution. Within this repository you will find: a custom client created from reverse engineering the protocol, exploit code in C, an early release of a Metasploit module, and the fuzzer developed to find the 0days.
Ongoing Projects
- Sickle
- A payload development framework designed for modern environments. Long gone are the days of using malware and shellcode out of the box. With the ever changing landscape attackers are now creating custom tooling. Sickle aims to allow YOU the user the ability to evolve with attackers and leverage a framework to make custom payload development easier.
- NDA NOT TODAY
- This is a play on words, but I have ongoing projects that I plan to release however until complete I prefer not to speak! However, as a sponsor you will get exclusive access to these projects before released publicly - if ever.
Sponsor Perks
Sponsors will get access to source code not public and guides if applicable (e.g AWAE-PREP.pdf / Ezekiels Wheel). It's important note I will not assist in sharing existing course material out of moral code and respect for authors. As for code... what you do with it is not my responsibility and I often use the MIT License if you are concerned on code-reuse. However I do not condone or engage in illegal activity whatsoever.
Anything else, contact me!
1 sponsor has funded wetw0rk’s work.
Featured work
-
wetw0rk/AWAE-PREP
This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with the AWAE course. This repo will likely contain custom code by…
Java 860 -
wetw0rk/Sickle
Payload development framework
Python 650 -
wetw0rk/Exploit-Development
CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
Python 57 -
wetw0rk/CA-UIM-Nimbus-Research
Vulnerability research on the CA UIM Nimbus protocol
Python 15