
Sign up to save your podcasts
Or


In this bird feeding episode of the Exploring Information Security podcast, Chris Maddalena joins me to discuss how to build your own tools.
Chris (@cmaddalena) gave a talk at DerbyCon this past year on writing Win32 Shellcode. We've talked before on a previous podcast around why building your own tools is important. Chris has also written several tools for his day job and for public consumption. His most recent tool is ODIN, a passive recon tool for penetration testers.
In this episode we discuss:
Why should someone build their own tool
What tool should people build?
How to get started building tools
What resources are available for building tools
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
By Timothy De Block4.7
4343 ratings
In this bird feeding episode of the Exploring Information Security podcast, Chris Maddalena joins me to discuss how to build your own tools.
Chris (@cmaddalena) gave a talk at DerbyCon this past year on writing Win32 Shellcode. We've talked before on a previous podcast around why building your own tools is important. Chris has also written several tools for his day job and for public consumption. His most recent tool is ODIN, a passive recon tool for penetration testers.
In this episode we discuss:
Why should someone build their own tool
What tool should people build?
How to get started building tools
What resources are available for building tools
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.

2,009 Listeners

370 Listeners

374 Listeners

651 Listeners

987 Listeners

8,500 Listeners

8,048 Listeners

314 Listeners

189 Listeners

224 Listeners