Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Zeyad Azima
  • Exploit Development
  • Vulnerability/CVE Analysis
  • MacOS
  • Certificates
  • Notes
  • IoT Exploitation
  • Defense Evasion
  • General
  • All Categories
    Zeyad Azima

    Zeyad Azima

    Brain Storming Stuff (Exploit Development, Reverse Engineering & More)

    • Email
    • Twitter
    • LinkedIn
    • GitHub
    • Buy Me a Coffee

    General

    General

    General

    CVE Analysis: Hacking a Crypto Network for Profit

    How Analyzing a simple CVE led me to takeover a Crypto Network.

    27 Aug 2024

    5 minute read

    General

    Pentest: From Customer to Full Application Takeover

    A story of chaining low vulnerabilities to takeover an application in a pentest project.

    24 Aug 2024

    13 minute read

    General

    Introduction to IOCTL (Input/Output CONTROL)

    An Introduction to Input Output CONTROL (IOCTL)

    09 Feb 2023

    11 minute read

    General

    Homograph Attack: Abusing IDNs for Phishing

    How to abuse IDNs for Phishing.

    22 Jan 2023

    12 minute read

    • Follow:
    • Feed
    © 2025 Zeyad Azima. Powered by Jekyll & Minimal Mistakes.