2024-07-21 |
Linux Kernel Exploitation - ret2usr |
Linux |
|
2024-07-21 |
Linux Kernel Exploitation - Environment |
Linux |
|
2021-02-28 |
Troopers18 - Exploitation on ARM-based Systems |
ARM |
|
2021-02-28 |
BlueFrostSecurity Ekoparty Exploitation Challenge |
BlueFrostSecurity |
|
2021-02-28 |
Semantic Search Implementation in Ropper |
Ropper |
|
2021-02-28 |
Analysis of a Heap Overflow in Foxit Reader |
Exploitation |
|
2021-02-28 |
Set up a Global Descriptor Table in Unicorn-Engine |
Articles |
|
2021-02-28 |
FileBytes - How to edit files |
python |
|
2021-02-28 |
FileBytes - Introduction |
Projects |
|
2021-02-28 |
backdoorCTF 2014 WriteUp - web250 |
WriteUp |
|
2021-02-28 |
backdoorCTF 2014 WriteUp - web200 |
WriteUp |
|
2021-02-28 |
backdoorCTF 2014 WriteUp - misc250 |
CTF |
|