Dec 3, 2024
30 mins read
"No Way To Prevent This," Says Only Allocator Where This Regularly Happens
4 mins read
A quick look at modern-day defenses against heap exploitation.
Sep 29, 2024
25 mins read
Cracking 12-character `.zip` passwords, exploiting a buggy frequency analysis program, and escalating Python's `.format()` to RCE for the first time ever.
Apr 4, 2024
13 mins read
A cheatsheet for the pwntools library commonly used for binary exploitation
Nov 10, 2023
2 mins read
A short reference guide on how to leak database metadata with various database software