Archives
- Mon 13 July 2020
- A Guide to Reversing and Evading EDRs: Part 3
- Mon 13 July 2020
- A Guide to Reversing and Evading EDRs: Part 2
- Mon 13 July 2020
- A Guide to Reversing and Evading EDRs: Part 1
- Mon 08 June 2020
- Recovering ProtoBuf Descriptors to Readable Definitions
- Sat 30 May 2020
- Covert Data Persistence with Windows Registry Keys
- Mon 04 May 2020
- Code Signing on a Budget
- Mon 03 February 2020
- Metasploit CTF 2020: RMF / Ace of Diamonds Write-Up
- Sun 28 April 2019
- WPA2-PSK PMKID Attack with Kali Live + Alfa AC1200
- Mon 15 April 2019
- CVE-2019-9730: LPE in Synaptics Sound Device Driver
- Sun 17 February 2019
- CVE-2019-8372: Local Privilege Elevation in LG Kernel Driver
- Mon 07 January 2019
- Understanding the Current Era of Binary Exploitation
- Tue 01 January 2019
- How-To Assess System Images: Overview
- Tue 24 April 2018
- Using Symbolic Execution to Recover IOCTLs in HEVD
- Mon 09 April 2018
- CVE-2017-11907 WPAD.dat Generator for Responder
- Fri 15 September 2017
- High-Level Approaches for Finding Vulnerabilities
- Fri 23 June 2017
- Resources for Learning Reverse Engineering
- Mon 19 December 2016
- CVE-2016-5563/4/5: RCE and Cardholder Data Exfiltration in Oracle OPERA
- Mon 12 December 2016
- java.lang.Runtime.exec() Payload Workarounds
- Wed 07 September 2016
- A Diagram for Sabotaging Cryptosystems
- Sat 11 July 2015
- PoliCTF 2015 Android Reversing Writeup