lolcads tech blog
How to build a high-performance network fuzzer with LibAFL and libdesock
Outsmarting the Watchdog: How can Adversaries evade Sigma Rule Detection during a Kerberos Golden Ticket Attack?
coderec: Detecting Machine Code in Binary Files
Towards utilizing BTF Information in Linux Memory Forensics
Adversary Emulation is a Complicated Profession - Intelligent Cyber Adversary Emulation with the Bounty Hunter
Bytecode Reuse Attack (Part 4)
Bytecode Injection (Part 3)
Fundamentals for Bytecode Exploitation (Part 2)
Introduction to Android Bytecode Exploitation (Part 1)
Timing Attack Experiments against Scudo (Part 2)
Scudo, the Allocator (Part 1)
E²VA: Use After Free Write/Execute Module (Part 4)
E²VA: Stack Buffer Overflow Module (Part 3)
E²VA: Android Basics (Part 2)
*PowerView* is evil, but *PowerVi* and *ew* are legit, right? - Missing signature-based detections due to PowerShell Script Block Logging Fragmentation
BPF Memory Forensics with Volatility 3
Diving into the art of userspace exploitation under Android - Introducing E²VA (Part 1)
friTap - Decrypting TLS on the fly
Make Frida Great Again
Exploration of the Dirty Pipe Vulnerability (CVE-2022-0847)
Exploiting CVE-2021-43247
Installing new .NET versions on a Windows 7 VM
libdesock
About
About
Contact