Low-level adventures
The State of Go Fuzzing - Did we already reach the peak?
Learning Linux kernel exploitation - Part 2 - CVE-2022-0847
Learning Linux kernel exploitation - Part 1 - Laying the groundwork
Overview of GLIBC heap exploitation techniques
MISC study notes about ARM AArch64 Assembly and the ARM Trusted Execution Environment (TEE)
LinkSys EA6100 AC1200 - Part 2 - A serial connection FTW!
The devil entered the stage!
LinkSys EA6100 AC1200 - Part 1 - PCB reversing
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.2
Breaking the D-Link DIR3060 Firmware Encryption - Static analysis of the decryption routine - Part 2.1
Breaking the D-Link DIR3060 Firmware Encryption - Recon - Part 1
What's a bitbang?
Welcome to the Poly Bomb 💣
Reversing and Exploiting Dr. von Noizemans Nuclear Bomb
Exploit Mitigation Techniques - Part 2 - Stack Canaries