Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Zeyad Azima
  • Exploit Development
  • Vulnerability/CVE Analysis
  • MacOS
  • Certificates
  • Notes
  • IoT Exploitation
  • Defense Evasion
  • General
  • All Categories
    Zeyad Azima

    Zeyad Azima

    Brain Storming Stuff (Exploit Development, Reverse Engineering & More)

    • Email
    • Twitter
    • LinkedIn
    • GitHub
    • Buy Me a Coffee

    Recent posts

    IoT Exploitation

    CVE-2021-42887: TOTOLINK EX1200T LOGIN BYPASS

    A detailed analysis for a login bypass vulnerability that affects the TOTOLINK EX1200T device.

    13 Mar 2023

    20 minute read

    Certificates

    eCPPT: The Honest Review

    Honest Review for the eCPPT Certificate

    17 Feb 2023

    2 minute read

    General

    Introduction to IOCTL (Input/Output CONTROL)

    An Introduction to Input Output CONTROL (IOCTL)

    09 Feb 2023

    11 minute read

    Certificates

    eMAPT & Mobile Apps/Sec Guide

    Honest Review & Guide for eMAPT Certificte

    06 Feb 2023

    6 minute read

    Vulnerability-CVE-Analysis

    CVE-2023-22809: Sudoedit Bypass - Analysis

    A detailed analysis for CVE-2023-22809.

    28 Jan 2023

    13 minute read

    Defense Evasion

    Exploit Writing (N0Pspoof): Portspoof Evasion

    Writing Exploit for Portspoof using C.

    24 Jan 2023

    11 minute read

    Certificates

    eCPTX: The Honest Review

    Honest Review & Guide for eCPTX Certificate

    23 Jan 2023

    7 minute read

    General

    Homograph Attack: Abusing IDNs for Phishing

    How to abuse IDNs for Phishing.

    22 Jan 2023

    12 minute read

    • Previous
    • 1
    • 2
    • 3
    • 4
    • 5
    • Next
    • Follow:
    • Feed
    © 2025 Zeyad Azima. Powered by Jekyll & Minimal Mistakes.