Reverse Engineering
Haunting the Heap: Use-After-Free in AuthenKey Login Handler (x64)
·620 words·3 mins
Reverse Engineering Diaries
Use-After-Free
Heap Exploitation
X64
Reverse Engineering
Function Pointer Hijack
Overflow in Silence: Stack Smash in MedBoard Log Viewer (x64)
·637 words·3 mins
Reverse Engineering Diaries
Stack Overflow
Shellcode
X64
Reverse Engineering
Buffer Exploitation
Binary Badlands – HTB University CTF 2024
·588 words·3 mins
CTF
HTB
HTB University
Crypto
Binary Exploitation
CTF 2024
Reverse Engineering
Challenge Writeup
Cryptanalysis
NahamCon CTF 2023 – Multiple Challenges
·563 words·3 mins
CTF
NahamCon
Mixed Challenges
Web
Crypto
Forensics
Pwn
Reverse Engineering
CTF 2023
Vaishnav Baraskar
Signed Once, Loaded Twice: Plugin Signature Bypass in CodeWorks IDE
·617 words·3 mins
Binary Exploitation
Plugin Security
TOCTOU
DLL Injection
Windows X64
Reverse Engineering
Swipe to Shell: Exploiting a Buffer Overflow in PaySafeTech Daemon
·725 words·4 mins
Exploit Development
Binary Exploitation
Buffer Overflow
Windows X86
Reverse Engineering
Stack Exploits