Polyverse picture

Polyverse

@polyverse

Share Your Success

Detecting a real exploit

Learn how an exploit of a real buffer-overflow vulnerability in Nginx is conducted (and how such an exploit is detected.)

Start Scenario

Intrusion Detection

Intrusion detection

Start Scenario

Alpine Container Installation

Polymorphic Linux installation in an Alpine Container

Start Scenario

CentOS Container Installation

Polymorphic Linux installation in a CentOS Container

Start Scenario

Ubuntu Container Installation

Polymorphic Linux installation in an Ubuntu Container

Start Scenario

Ubuntu Host Installation

Polymorphic Linux installation on an Ubuntu Host

Start Scenario

Polyscripted WordPress

WordPress with PHP Polyscripting applied, making PHP code injectios a thing of the past

Start Scenario