Recent posts
We are ARMed no more ROPpery Here
A blog on Pointer Authentication and How it mitigates ROP.
CVE Analysis: Hacking a Crypto Network for Profit
How Analyzing a simple CVE led me to takeover a Crypto Network.
Pentest: From Customer to Full Application Takeover
A story of chaining low vulnerabilities to takeover an application in a pentest project.
OSWP Review & Guide
My OSWP Review and Guide.
OSWP PlayBook: (Offensive Security Wireless Professional)
OSWP & Wireless Pentest Playbook
OSMR Journey & Guide
My OSMR Journy and Guide
ROPGadget: Writing a ROPDecoder
An in-depth blog on how to create a ROPDecoder.
OSED Journey & Guide
My OSED Journy and Guide