Skip to main content

Reverse Engineering

Haunting the Heap: Use-After-Free in AuthenKey Login Handler (x64)
·620 words·3 mins
Reverse Engineering Diaries Use-After-Free Heap Exploitation X64 Reverse Engineering Function Pointer Hijack
Overflow in Silence: Stack Smash in MedBoard Log Viewer (x64)
·637 words·3 mins
Reverse Engineering Diaries Stack Overflow Shellcode X64 Reverse Engineering Buffer Exploitation
Binary Badlands – HTB University CTF 2024
·588 words·3 mins
CTF HTB HTB University Crypto Binary Exploitation CTF 2024 Reverse Engineering Challenge Writeup Cryptanalysis
NahamCon CTF 2023 – Multiple Challenges
·563 words·3 mins
CTF NahamCon Mixed Challenges Web Crypto Forensics Pwn Reverse Engineering CTF 2023 Vaishnav Baraskar
Signed Once, Loaded Twice: Plugin Signature Bypass in CodeWorks IDE
·617 words·3 mins
Binary Exploitation Plugin Security TOCTOU DLL Injection Windows X64 Reverse Engineering
Swipe to Shell: Exploiting a Buffer Overflow in PaySafeTech Daemon
·725 words·4 mins
Exploit Development Binary Exploitation Buffer Overflow Windows X86 Reverse Engineering Stack Exploits