Home
Advisories
Projects and Tools
04 Jul 2024 -
Linux Kernel Exploitation - ret2usr
02 Jul 2024 -
Linux Kernel Exploitation - Environment
19 Mar 2018 -
Troopers18 - Exploitation on ARM-based Systems
15 Nov 2017 -
BlueFrostSecurity Ekoparty Exploitation Challenge
17 Dec 2016 -
Semantic Search Implementation in Ropper
15 May 2016 -
Analysis of a Heap Overflow in Foxit Reader
27 Mar 2016 -
Set up a Global Descriptor Table in Unicorn-Engine
23 Mar 2016 -
FileBytes - How to edit files
03 Mar 2016 -
FileBytes - Introduction
23 Mar 2014 -
backdoorCTF 2014 WriteUp - web250
23 Mar 2014 -
backdoorCTF 2014 WriteUp - web200
23 Mar 2014 -
backdoorCTF 2014 WriteUp - misc250
23 Mar 2014 -
backdoorCTF 2014 WriteUp - crypto200
17 Jun 2013 -
DEF CON CTF 2013 WriteUp - 3dub 1
05 May 2013 -
VolgaCTF 2013 WriteUp - stegasic 500
03 May 2013 -
VolgaCTF 2013 WriteUp - exploit 100
22 Apr 2013 -
PlaidCTF 2013 WriteUp - cyrpto
23 Mar 2013 -
ForbiddenBITS CTF 2013 WriteUp - poir
19 Mar 2013 -
ForbiddenBITS CTF 2013 WriteUp - smelf