Source Code Auditing

Performing static analysis of Python & Java code.

Directory Junctions

Exploiting Directory Junctions for local privilege escalation.

Integer Security

Common security issues with integer variables.

Linux x64 Reverse Shellcode

Reverse shells in x64 assembly.

Position Independent Executables

Exploiting PIE enabled executables.

Execve Shellcode

Executing the execve syscall on x64 Linux using Shellcode.

ARM64 ROP Chaining

Performing a Return-to-libc attack on ARM64 systems.

x64 MPROTECT ROP

Calling mprotect on x64 Linux.

MIPS32 Buffer Overflows

Exploiting memory corruption vulnerabilities on MIPS32 systems.

LD_PRELOAD Exploitation

Using LD_PRELOAD for dynamic function hooking and privilege escalation.

Cyber Apocalypse 2023

Cyber Apocalypse CTF 2023 challenge writeups.

Windows x64 Reverse Shellcode

Reverse shells in x64 assembly.