ReverseEngineerings
Haunting the Heap: Use-After-Free in AuthenKey Login Handler (x64)
·620 words·3 mins
Reverse Engineering Diaries
Use-After-Free
Heap Exploitation
X64
Reverse Engineering
Function Pointer Hijack
Overflow in Silence: Stack Smash in MedBoard Log Viewer (x64)
·637 words·3 mins
Reverse Engineering Diaries
Stack Overflow
Shellcode
X64
Reverse Engineering
Buffer Exploitation
Copy, Paste, Exploit: Buffer Overflow in EduGrade Import Engine
·482 words·3 mins
Buffer Overflows
Memory Exploits
Windows X64
Strcpy
Stack Overflow
EduGrade
Strings Unleashed: Unsafe Length Handling in BookPro Reader
·514 words·3 mins
Buffer Overflows
Memory Exploits
Windows X64
Metadata Parsing
Zip Exploitation
BookPro Reader
Phantom Libraries: DLL Hijacking in OfficePort Scheduler
·504 words·3 mins
DLL Hijacking
Persistence
Windows 11
DLL Injection
OfficePort
Local Execution
Heap Drift: Misaligned Write in SafeMail’s Attachment Parser
·680 words·4 mins
Heap Corruption
Memory Exploits
Windows X86
Heap Metadata
UAF
Desktop Clients
Racing the Kernel: Use-After-Free in SnapBackup.sys
·547 words·3 mins
Kernel Exploits
Race Conditions
Windows X64
Driver Exploitation
UAF
Kernel RCE
Stacking Bytes: Heap Overflow in PrintSecure’s Spooler
·606 words·3 mins
Heap Overflow Exploits
Windows X64
Heap Corruption
RPC
Privilege Escalation
Overflowing Authority: Stack Smash in LocalAdminTool.exe
·486 words·3 mins
Stack Overflow
Privilege Escalation
Windows X64
Named Pipe
Shellcode
Stack Exploit
Chaining Control: ROP Exploitation in HealthDesk Report Viewer
·512 words·3 mins
ROP Exploits
Windows X86
ROP
Buffer Overflow
Legacy Systems
Echoes of Control: Format String Exploit in DevMon
·488 words·3 mins
Format String Exploits
Windows XP
Format String
EIP Control
Shell Execution
From Blob to Boom: Insecure Deserialization in FinPro CRM
·556 words·3 mins
Exploit Development
Deserialization
Windows X86
Insecure Deserialization
Function Pointer Overwrite
Signed to Compromise: Kernel Overflow in XLogDriver.sys
·583 words·3 mins
Exploit Development
Kernel Exploitation
Kernel Exploits
Windows X64
Signed Drivers
Token Stealing
Signed Once, Loaded Twice: Plugin Signature Bypass in CodeWorks IDE
·617 words·3 mins
Binary Exploitation
Plugin Security
TOCTOU
DLL Injection
Windows X64
Reverse Engineering
Swipe to Shell: Exploiting a Buffer Overflow in PaySafeTech Daemon
·725 words·4 mins
Exploit Development
Binary Exploitation
Buffer Overflow
Windows X86
Reverse Engineering
Stack Exploits