RSS.Social

Low-level adventures

follow: @[email protected]

Posts

The State of Go Fuzzing - Did we already reach the peak?

Learning Linux kernel exploitation - Part 2 - CVE-2022-0847

Learning Linux kernel exploitation - Part 1 - Laying the groundwork

Overview of GLIBC heap exploitation techniques

MISC study notes about ARM AArch64 Assembly and the ARM Trusted Execution Environment (TEE)

LinkSys EA6100 AC1200 - Part 2 - A serial connection FTW!

The devil entered the stage!

LinkSys EA6100 AC1200 - Part 1 - PCB reversing

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2

Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1

Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1

What's a bitbang?

Welcome to the Poly Bomb 💣

Reversing and Exploiting Dr. von Noizemans Nuclear Bomb

Exploit Mitigation Techniques - Part 2 - Stack Canaries