RSS.Social

Bill Demirkapi's Blog

follow: @[email protected]

Posts

Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale

Abusing Exceptions for Code Execution, Part 2

Sharing is Caring: Abusing Shared Sections for Code Injection

Abusing Exceptions for Code Execution, Part 1

Unpacking CVE-2021-40444: A Deep Technical Analysis of an Office RCE Exploit

Abusing Windows’ Implementation of Fork() for Stealthy Memory Operations

Insecure by Design, Epic Games Peer-to-Peer Multiplayer Service

Defeating Macro Document Static Analysis with Pictures of My Cat

How to use Trend Micro's Rootkit Remover to Install a Rootkit

Several Critical Vulnerabilities on most HP machines running Windows

Insecure by Design, Weaponizing Windows against User-Mode Anti-Cheats

Local Privilege Escalation on Dell machines running Windows

Remote Code Execution on most Dell computers

Hacking College Admissions

Reversing the CyberPatriot National Competition Scoring Engine