Bill Demirkapi's Blog
Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale
Abusing Exceptions for Code Execution, Part 2
Sharing is Caring: Abusing Shared Sections for Code Injection
Abusing Exceptions for Code Execution, Part 1
Unpacking CVE-2021-40444: A Deep Technical Analysis of an Office RCE Exploit
Abusing Windows’ Implementation of Fork() for Stealthy Memory Operations
Insecure by Design, Epic Games Peer-to-Peer Multiplayer Service
Defeating Macro Document Static Analysis with Pictures of My Cat
How to use Trend Micro's Rootkit Remover to Install a Rootkit
Several Critical Vulnerabilities on most HP machines running Windows
Insecure by Design, Weaponizing Windows against User-Mode Anti-Cheats
Local Privilege Escalation on Dell machines running Windows
Remote Code Execution on most Dell computers
Hacking College Admissions
Reversing the CyberPatriot National Competition Scoring Engine