Writing a Context-keyed Payload Encoder in Metasploit
I will present the idea of Context-keyed Payloads and how it could be useful for Redteaming.
We will write a functional example in assembly (with some tricks) and then make it more useful by making a Metasploit module/encoder out of it.
Assembly debugging, Ruby debugging, shellcoding, IDA, gdb, Malware, Metasploit, ...
Room:  REDTEAM PENTESTING