
Sign up to save your podcasts
Or


In this bird feeding episode of the Exploring Information Security podcast, Chris Maddalena joins me to discuss how to build your own tools.
Chris (@cmaddalena) gave a talk at DerbyCon this past year on writing Win32 Shellcode. We've talked before on a previous podcast around why building your own tools is important. Chris has also written several tools for his day job and for public consumption. His most recent tool is ODIN, a passive recon tool for penetration testers.
In this episode we discuss:
Why should someone build their own tool
What tool should people build?
How to get started building tools
What resources are available for building tools
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.
By Timothy De Block4.7
4343 ratings
In this bird feeding episode of the Exploring Information Security podcast, Chris Maddalena joins me to discuss how to build your own tools.
Chris (@cmaddalena) gave a talk at DerbyCon this past year on writing Win32 Shellcode. We've talked before on a previous podcast around why building your own tools is important. Chris has also written several tools for his day job and for public consumption. His most recent tool is ODIN, a passive recon tool for penetration testers.
In this episode we discuss:
Why should someone build their own tool
What tool should people build?
How to get started building tools
What resources are available for building tools
[RSS Feed] [iTunes]
Sign up with your email address to receive news and updates.
We respect your privacy.

2,011 Listeners

373 Listeners

374 Listeners

655 Listeners

988 Listeners

8,568 Listeners

8,041 Listeners

315 Listeners

189 Listeners

225 Listeners