All articles
- Firmware reverse engineering and analysis of router devices Nov 24, 2025
- Exploring Integer Overflow: libxml2 Integer Overflow, which leads to OOB Aug 22, 2025
- Linux Kernel Exploitation Part 1: ret2usr Jun 5, 2025
- Linux Kernel Exploitation Part 2: Adding Mitigitions Jun 5, 2025
- EXIM: CVE-2020-28025: Heap out-of-bounds read in pdkim_finish_bodyhash() May 26, 2025
- Android Cheatsheet Jan 17, 2025
- Linux Heap Exploitation internals Jan 14, 2025
- Linux Heap Exploitation: Unsafe Unlink Jan 14, 2025
- write4 | ROPEmporium [4] Nov 12, 2024
- callme | ROPEmporium [3] Nov 12, 2024
- split | ROPEmporium [2] Nov 12, 2024
- ret2win | ROPEmporium [1] Nov 11, 2024
- Full-Technical Analysis of DcRAT: Dissecting the Stealth, Persistence, and Power of DarkCrystal RAT Aug 31, 2024
- How to catch smart hackers? Honeypots Jun 20, 2024
- Heap Overflow in assimp Apr 5, 2024
- CVE-2021-38003 The Hole Leak to RCE Mar 30, 2024
- CVE-2020-6418 Type Confusion V8 Feb 2, 2024
- CVE-2019-5782 Out-Of-Bounds V8 Dec 1, 2023
- V8 Internals: Tree Aug 5, 2023
- Getting Started with Embedding V8 Jul 6, 2023
- CVE-2021-36414: heap-buffer-overflow MP4Box Apr 4, 2023