Posts
-
pwnhub
Various heap exploitation techniques in one challenge
-
sandboxgrind
Escaping valgrind "sandbox"
-
Secure OCaml Sandbox
Escaping OCaml sandbox based on function blacklisting
-
sloppy-dev writeup
Intro to exploiting linux kernel modules | writeup from sloppy-dev
-
monochromatic writeup
Exploiting use after free vulnerability in chrome via Mojo IPC.
-
children_tcache writeup and tcache overview
Exploiting one NULL byte buffer overflow with glibc>=2.26. Also, it introduces the tcache mechanism.
-
ssss and ssss2 writeup
Breaking AES counter mode encryption with repeating counter
-
Analysis of a Polish BankBot
My analysis of the android banking malware
-
Unicorn Engine tutorial
My Unicorn Engine tutorial. Optimizing recursive function; analyzing a shellcode; calling a binary's function; ARM.
-
write-up for dont_panic
Reverse engineering stripped binary written in Go. I used Intel's Pin tool to count executed instructions to brute-force byte-by-byte.