Executing the execve syscall on x64 Linux using Shellcode.
Bluetooth Low Energy
Completing BLE CTF.
ARM64 ROP Chaining
Performing a Return-to-libc attack on ARM64 systems.
x64 MPROTECT ROP
Calling mprotect on x64 Linux.
MIPS32 Buffer Overflows
Exploiting memory corruption vulnerabilities on MIPS32 systems.
Command Injection
Exploiting command injection vulnerabilities.
Serial Peripheral Interfaces
Interacting with SPI to extract the contents of a ROM.
TEMPEST SDR
Intercepting signals from a HDMI monitor.
UART Connections
Interfacing with UART to gain command line access on a embedded device.
GPS Signal Spoofing
Falsifying Global Positioning System signals.
VLAN Attacks
Performing VLAN hopping attacks.
First Hop Redundancy Protocols
Exploiting VRRP & HSRP.